Know the password format, how to configure the rules?
#1
Hi,

For the hashmode 10700, I have a password format of
[english word][number 1-100][english word][number 1-100].

Wanted to know how to configure this.

Thank you for the help.
Reply
#2
Code:
git clone https://github.com/hashcat/hashcat-utils.git
cd hashcat-utils/src
make
# you'll need to provide english wordlist
for x in {1..100}; do;  echo ${x}; done > nums.txt
./combinator.bin $MY_ENGLISH_WORDLIST nums.txt > comb1.txt
cp comb1.txt comb2.txt
./combinator.bin comb1.txt comb2.txt > result.wl
Reply
#3
depending on how big the first comb1.txt is, you can skip the second processing with combinator and leave it straight to hasccat to combine the list with itself

https://hashcat.net/wiki/doku.php?id=combinator_attack
just specify the comb1.txt twice

hashcat -m 0 -a 1 hash.txt comb1.txt comb1.txt
Reply
#4
(05-05-2021, 07:46 PM)3nt3mp Wrote: Hi,

For the hashmode 10700, I have a password format of
[english word][number 1-100][english word][number 1-100].

Wanted to know how to configure this.

Thank you for the help.

comboleetor.pl can do what you want.   https://jimby.name/techbits/recent/comboleetor/


Put your words in 'blocks.txt'. 

Put the following in 'numbers.txt'

%d
1-100

This will generate numbers as
1
2
3
. . .
97
98
99
100

in the numbers hash.  If you want zero filled use this in numbers.txt

%03.3d
1-100


Then run  as follows:

echo 'BNBN' | perl comboleetor.pl  2> /dev/null  

Note that this can generate a lot of output.

HTH
Reply
#5
Wink 
I got error in Hashcat help : You have enabled --force to bypass dangerous warnings and errors!
This can hide serious problems and should only be done when debugging.
Do not report hashcat issues encountered when using --force.
Reply