Hybrid attack using rules on a dictionary
#1
I tried running this, but hashcat told me "ERROR: Use of rules-file or rules-generate only allowed in attack-mode 0."

.\hashcat64.exe -m 0 -a 6 -i -r .\rules\dive.rule hashes.txt dict.txt ?a?a

I can run the hybrid attack with my main word list, but what I would like to do is use dive.rule to create some new wordlist and then run the hybrid attack with that new word list (old word list with rules applied). 

How can I accomplish this? I can use other tools if needed. 

Thanks.
#2
you can do:

Quote:hashcat64 -a 6 dict.txt ?a?a -i --stdout | hashcat64 -m 0 -a 0 -r .\rules\dive.rule hashes.txt
#3
(12-02-2016, 03:46 PM)atom Wrote: you can do:

Quote:hashcat64 -a 6 dict.txt ?a?a -i --stdout | hashcat64 -m 0 -a 0 -r .\rules\dive.rule hashes.txt

Thanks. Is it not possible to see the status of the command? I can't seem to view the status as normal.
#4
Yes, add --status --status-timer 1 to the 2nd
#5
(12-02-2016, 07:50 PM)atom Wrote: Yes, add --status --status-timer 1 to the 2nd

That's helpful. Is it possible to get a time estimation as well?
#6
Not with stdin input, because hashcat can't know the number of candidates it will recieve via stdin.
#7
(12-02-2016, 07:56 PM)atom Wrote: Not with stdin input, because hashcat can't know the number of candidates it will recieve via stdin.

Can you calculate the number of candidates beforehand and then use the speed (# hashes/s) to estimate a time to completion?
#8
Yes, that will work
#9
(12-02-2016, 08:15 PM)atom Wrote: Yes, that will work

Ok, how can you figure out the number of candidates?
#10
number-of-words-in-wordlist1 * number-of-words-in-wordlist2 * number-of-rules