Combinator help
#1
My problem: I want Hashcat to use combinations of all words in a dictionary file.

The Hashcat combinator page: https://hashcat.net/wiki/doku.php?id=combinator_attack mentions that the *-a 1* configuration only combines 2 words together. 

For example a dictionary like:

    pass
    12345
    omg
    Test

in Combinator mode results in tries like:

    passpass
    pass12345
    passomg
    passTest
    12345pass
    1234512345
    12345omg
    12345Test
    omgpass
    omg12345
    omgomg
    omgTest
    Testpass
    Test12345
    Testomg
    TestTest
    

Whereas I want Hashcat to try every combine instead like this:

    pass12345omgTest
    12345passomgTest
    ...

Is there a way for Hashcat to try every combination of every word in a dictionary instead? Thanks in advance! Smile
#2
Hi,

You may want to try Prince Processor : https://hashcat.net/wiki/doku.php?id=princeprocessor
Code:
 ./pp64 --pw-min=5 --pw-max=5 < wordlist.txt | hashcat -m 0 -a 0 hash_list.txt --outfile results.txt -r AnyRuleYouWantToAdd.rule
The --pw-min/max lelt you choose the min/max length of the output. You can also use --elem-cnt-min and --elem-cnt-max and put them to X to use only a combinator of X words
try ./pp64 --help for more help
#3
(11-16-2018, 10:10 AM)Nay Wrote: Hi,

You may want to try Prince Processor : https://hashcat.net/wiki/doku.php?id=princeprocessor
Code:
 ./pp64 --pw-min=5 --pw-max=5 < wordlist.txt | hashcat -m 0 -a 0 hash_list.txt --outfile results.txt -r AnyRuleYouWantToAdd.rule
The --pw-min/max lelt you choose the min/max length of the output. You can also use --elem-cnt-min and --elem-cnt-max and put them to X to use only a combinator of X words
try ./pp64 --help for more help

Thank you sir.
I understand from some changlog documentation from hashcat that prince is not integrated into hashcat as attack mode 6 and 7 is that right? I have experimented with these modes but failed to find the password associated with my test hash. 

This is the command I'm trying:
Code:
hashcat64.exe -a 6 -m 13000 -w 3 target-hash.txt pw-list.txt ?d

Reading more about -a 6 it appears that it combines a word list with a mask however in my case I don't care about the mask - instead as mentioned in my first post - I only care about trying all possible combinations of words in a wordlist. Is there a way not to specify a mask with attack mode 6 or should I use prince processor directly as you advised? 

Thanks in advance.
#4
why are you even trying to use -a 6? That's a completely different attack mode. Use -a 0 and pipe in princeprocessor.