Posts: 4
Threads: 2
Joined: Feb 2021
02-10-2021, 02:11 PM
Hi All
I hope everybody is safe and well?
I have a question on brute force password finding.
I know that:
hashcat.exe -m 1000 -a 0 --potfile-disable -r dive.rule hashes.txt dictionary.dic
Can be used to recover a password via key words.
Is there a rule that can be used without the dictionary file to revoer a password of uptp 10 characters that may have letters, numbers and special characters?
Regards
Posts: 890
Threads: 15
Joined: Sep 2017
(02-10-2021, 02:11 PM)UKLondon2025 Wrote: Hi All
I hope everybody is safe and well?
I have a question on brute force password finding.
I know that:
hashcat.exe -m 1000 -a 0 --potfile-disable -r dive.rule hashes.txt dictionary.dic
Can be used to recover a password via key words.
Is there a rule that can be used without the dictionary file to revoer a password of uptp 10 characters that may have letters, numbers and special characters?
Regards
see,
https://hashcat.net/wiki/doku.php?id=mask_attack
more or less a bruteforce attack using a mask ?a?a?a?a?a?a?a?a?a?a with increment-option
Posts: 4
Threads: 2
Joined: Feb 2021
Thankyou.
(02-10-2021, 04:48 PM)Snoopy Wrote: (02-10-2021, 02:11 PM)UKLondon2025 Wrote: Hi All
I hope everybody is safe and well?
I have a question on brute force password finding.
I know that:
hashcat.exe -m 1000 -a 0 --potfile-disable -r dive.rule hashes.txt dictionary.dic
Can be used to recover a password via key words.
Is there a rule that can be used without the dictionary file to revoer a password of uptp 10 characters that may have letters, numbers and special characters?
Regards
see, https://hashcat.net/wiki/doku.php?id=mask_attack
more or less a bruteforce attack using a mask ?a?a?a?a?a?a?a?a?a?a with increment-option