Can you make hashcat NOT try previous passwords tried with a different attack ?
#1
Question 
So I see that you can save sessions with hashcat, but it seems it only works with the specific attack that you are using at the moment, and that it is not possible to transfer the "non find" password ranges to another attack.

Or is it ? So what if you try different attacks, like :

  1. First a dictionary attach
  2. Then a combinator attack
  3. Then a mask attack
  4. And then a brute force attack

Is there a way to tell hashcat to NOT try a password that was already tried in the attacks previously done ? If yes, how ?
Reply
#2
take a look at hashcat the brain

https://github.com/hashcat/hashcat/blob/...t-brain.md
Reply
#3
(01-02-2023, 02:10 PM)Snoopy Wrote: take a look at hashcat the brain

https://github.com/hashcat/hashcat/blob/...t-brain.md

It seems to be exactly what I'm looking for, thanks !
Reply