Gordon, Stanley 2016-07-28
try restore
try different attack mode
$ hashcat --session <SESSION_NAME> ...
hashcat will generate two files
$ hashcat --restore --session <SESSION_NAME> ...
Try all combinations for given charsets
ex:
rule: ?d?d
will generate
00, 01, 02, ..., 99
?l = abcdefghijklmnopqrstuvwxyz
?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ
?d = 0123456789
?s = !"#$%&'()*+,-./:;<=>?@[\]^-`{|}~
?a = ?l?u?d?s
?b = 0x00 - 0xff
Each word of a dictionary is appended to each word in another dictionary
ex:
dictionary1: A, B, C
dictionary2: 0, 1, 2
will generate
A0, A1, A2, B0, B1, B2, C0, C1, C2
Similar to combinator attack,
One side is a dictionary
another side uses brute-force
ex:
dictionary: A, B, C
brute-force rule: ?d
will generate
A0, A1, ..., A9, B0, B1, ..., C9
compares the following:
There are about 5000 names in English
Compare three attach modes using:
5000 names + 1~4 digits
try the remaining attack mode
collect password lists
trace hashcat