08-25-2021, 12:47 PM
(08-24-2021, 09:21 PM)Alcanjp Wrote:(08-24-2021, 08:29 PM)Snoopy Wrote: there is more than one answer to this
when using dictionary attack (as you are doing right now), you can combine your dictionary with rules, see
https://hashcat.net/wiki/doku.php?id=rule_based_attack
so in your case this would be a rule-file with just 2 rules
$X
$x
this tells hashcat to append one upper X or lower x to each pw-candidate you are trying
or when using mask-attack you can specify up to 4 different charset so
-1 Xx and mask ?a?a?a?a?1 means 4 times all possible chars, 5th char only X or x
EDIT:
Hashmode: 14600 - LUKS (Iterations: 163044)
Speed.#1.........: 3079 H/s (89.54ms) @ Accel:32 Loops:512 Thr:512 Vec:1
Speed.#2.........: 2833 H/s (44.74ms) @ Accel:8 Loops:1024 Thr:512 Vec:1
Speed.#5.........: 337 H/s (57.12ms) @ Accel:512 Loops:256 Thr:1 Vec:4
Speed.#*.........: 6249 H/s
not a real cracking rig, but luks is just slow...
Is there a way to pipe the output to a text file or terminal to see what it is doing?
I think I know what I need:
9 low character + X or x added to the end this is what I remembered from the password.
I need a rule file for the $X $x called myrules.rule and does have to be placed in "/usr/share/hashcat/rules/"?
Will the line to launch the attack be this one?
hashcat64.bin -m 14600 -a3 -w 3 LUKS_Partition.001 Dictionary.txt -1 Xx ?l?l?l?l?l?l?l?l?l?1
thank you.