Posts: 57
	Threads: 12
	Joined: Jul 2013
	
	
 
	
	
		What is better? I am trying to work on hashes.org huge list of emails that were hashed, but I've run into a slow-down
Combination attack
wordlist + list of domains with a ^@ set on the right dictionary
My dictionary consists of facebook names, plus various other lists of names.
or
Straight attack with a rule with rules like this
l$@$a$o$l$.$c$o$m
	
	
	
	
	
 
 
	
	
	
		
	Posts: 117
	Threads: 0
	Joined: Nov 2013
	
	
 
	
	
		Do attacks like with the rules. Note that it will only be able to append up to 15 so use combinator for the ones that are above that. Also switch the @ for a $ and you should get a few more.
	
	
	
	
	
 
 
	
	
	
		
	Posts: 5,232
	Threads: 233
	Joined: Apr 2010
	
	
 
	
	
		From performance perspective, if you have enough domains (1k+) in the right dictionary, combinator is simply faster (no interpreter involed).
	
	
	
	
	
 
 
	
	
	
		
	Posts: 57
	Threads: 12
	Joined: Jul 2013
	
	
 
	
		
		
		10-14-2014, 12:46 PM 
(This post was last modified: 10-14-2014, 01:17 PM by giveen.)
		
	 
	
		I have a 1 million+ domain list
Is there a way to apply a rules list to a dictionary in a combo attack rather than just using simple rules? I would like to do something like best64 to the user list in the combo attack
	
	
	
	
	
 
 
	
	
	
		
	Posts: 5,232
	Threads: 233
	Joined: Apr 2010
	
	
 
	
	
		I'd say use hashcat in --stdout mode to either generate a new dictionary or pipe it to oclHashcat
	
	
	
	
	
 
 
	
	
	
		
	Posts: 57
	Threads: 12
	Joined: Jul 2013
	
	
 
	
	
		 (10-14-2014, 02:11 PM)atom Wrote:  I'd say use hashcat in --stdout mode to either generate a new dictionary or pipe it to oclHashcat
Okay, I'll try that.
Right now, my username list is sitting around 9 million (bunch of dumps + the 5 million gmail dump)
Trying to find more.