how can I crack repeated password with brute forcing?
#1
Hi.

I'm trying to crack MD5 hash made from repeated password.

P@ssw0rd become P@ssw0rdP@ssw0rd before It's hashed for example.


I tried like this

hashcat -a 3 -0 -r duplicate.rule -i '?a?a?a?a?a?a?a?a' hashfile


but it said -r option only supports -a 0.

so I tried stdin mode to use -r option but it was veeerrry slow.

Any good solution about that?
Reply
#2
(03-23-2023, 10:03 AM)chicken Wrote: Hi.

I'm trying to crack MD5 hash made from repeated password.

P@ssw0rd become P@ssw0rdP@ssw0rd before It's hashed for example.

I tried like this

hashcat -a 3 -0 -r duplicate.rule -i '?a?a?a?a?a?a?a?a' hashfile

but it said -r option only supports -a 0.

so I tried stdin mode to use -r option but it was veeerrry slow.

Any good solution about that?

you are mixing up 2 different attack types -a3 is bruteforce so its basically testing every combination of every char in your charset, for rules you need -a0 and a dictionary file, a dictionary is a list of passwordcanditates

lets assume file dictionary.txt contains

1
2
3
a
b
c

with a rulefile containing two lines

:
p1

for description opf the rules see https://hashcat.net/wiki/doku.php?id=rule_based_attack


you will get the basic dictionary content and 
11
22
33
aa
bb
cc

but you will need a dictionary file for that, you could start with these lists https://hashmob.net/resources/hashmob
Reply