Understanding hybrid_attack
#1
Hi All,
I've some troubles in understanding how the hybrid_attack works.

what I would like to achieve is to try the follow chars pattern prepended to each of the words from the dictionary

Code:
[a-z0-9]+(.|_)[a-z0-9]+DICT_WORD

I'd like to have the keyspace incremental so that it will start from 3 chars up to X chars:

Code:
a.aDICT_WORD
zzzzzzzz.zzzzzzzDICT_WORD

Any help is really appreciated
#2
Hashcat/Oclhc does not have pre-processing, but that doesn't mean you can't do what you want with the mutation engine.
Use maskprocessor to generate the rules:
Code:
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?1^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?1^?2^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?2^?1^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?2^?1^?2^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?2^?2^?1^?2^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?2^?1^?2^?2^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?2^?2^?1^?2^?2^?2^?2^?2 -o rules.txt
...
Then just use those rules with the wordlist
This is one way of doing it.