Posts: 13
	Threads: 3
	Joined: Jul 2018
	
	
 
	
		
		
		03-01-2019, 06:35 AM 
(This post was last modified: 03-01-2019, 08:13 AM by kangduwang.)
		
	 
	
		Usually when you run a bruce force attack, hardware can generate & compare millions or even billions passphase per seconds. But in wordlist attack, store billions of passphase in text file already take GBs of harddrive & time to generate & prepare. If i want to run a wordlist attack with trillions of passphase. Is there any trick for this to make it fast or take less space?
	
	
	
	
	
 
 
	
	
	
		
	Posts: 929
	Threads: 4
	Joined: Jan 2015
	
	
 
	
	
		You can assemble the passphrases from a one-word-per-line wordlist, using princeprocessor, and then pipe it to hashcat, using one of the prince_*.rule rules files to supply more work to the GPUs.
	
	
	
~
	
	
 
 
	
	
	
		
	Posts: 803
	Threads: 135
	Joined: Feb 2011
	
	
 
	
	
		Combinator Attack (-a 1) lets you merge two wordlists, and you can append rules as well.
	
	
	
	
	
 
 
	
	
	
		
	Posts: 24
	Threads: 8
	Joined: Jun 2018
	
	
 
	
	
		Rules are your friends! I've gained a lot of respect for the mad geniuses that came up with one rule.
https://github.com/NotSoSecure/password_cracking_rules
That plus rockyou has a stupid amount of success.
Well tuned masks are lethal as well.
https://blog.netspi.com/netspis-top-pass...-for-2015/
https://blog.korelogic.com/blog/2014/04/...topologies
One consideration when approaching a session is that masks and rules are handled in the GPU, all other generation and feeding is done by the cpu; pre-generation can actually slow you down a lot.
This article was a real eyeopener for me: 
https://hashcat.net/wiki/doku.php?id=fre...full_speed