Dictiionary Attack - how-to-question
#25
ohk, copied. the rule-based attack as such is considered the most complicated but most efficient attack - it gets even more complicated in combination with a "wordlist" - I will try this, what I understood from your proposed command "-2 ?u?l?d@" is that "-2" is some kind of attack vector nomination in which upper (?u) and lower (?l) case letters, digits (?d) and the special character (@) are combined, what does "-w 3" do ?
Reply


Messages In This Thread
Dictiionary Attack - how-to-question - by Grazze - 04-17-2020, 02:29 PM
RE: Dictiionary Attack - how-to-question - by Grazze - 04-23-2020, 01:05 PM