Rules File
#1
Question 
Hi All

I hope everybody is safe and well?

I have a question on brute force password finding.

I know that: 

hashcat.exe -m 1000 -a 0 --potfile-disable -r dive.rule hashes.txt dictionary.dic

Can be used to recover a password via key words.

Is there a rule that can be used without the dictionary file to revoer a password of uptp 10 characters that may have letters, numbers and special characters?

Regards
Reply
#2
(02-10-2021, 02:11 PM)UKLondon2025 Wrote: Hi All

I hope everybody is safe and well?

I have a question on brute force password finding.

I know that: 

hashcat.exe -m 1000 -a 0 --potfile-disable -r dive.rule hashes.txt dictionary.dic

Can be used to recover a password via key words.

Is there a rule that can be used without the dictionary file to revoer a password of uptp 10 characters that may have letters, numbers and special characters?

Regards

see, https://hashcat.net/wiki/doku.php?id=mask_attack

more or less a bruteforce attack using a mask ?a?a?a?a?a?a?a?a?a?a with increment-option
Reply
#3
Thankyou.

(02-10-2021, 04:48 PM)Snoopy Wrote:
(02-10-2021, 02:11 PM)UKLondon2025 Wrote: Hi All

I hope everybody is safe and well?

I have a question on brute force password finding.

I know that: 

hashcat.exe -m 1000 -a 0 --potfile-disable -r dive.rule hashes.txt dictionary.dic

Can be used to recover a password via key words.

Is there a rule that can be used without the dictionary file to revoer a password of uptp 10 characters that may have letters, numbers and special characters?

Regards

see, https://hashcat.net/wiki/doku.php?id=mask_attack

more or less a bruteforce attack using a mask ?a?a?a?a?a?a?a?a?a?a with increment-option
Reply