Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Understanding hybrid_attack
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hi All,
I've some troubles in understanding how the hybrid_attack works.

what I would like to achieve is to try the follow chars pattern prepended to each of the words from the dictionary

Code:
[a-z0-9]+(.|_)[a-z0-9]+DICT_WORD

I'd like to have the keyspace incremental so that it will start from 3 chars up to X chars:

Code:
a.aDICT_WORD
zzzzzzzz.zzzzzzzDICT_WORD

Any help is really appreciated
Hashcat/Oclhc does not have pre-processing, but that doesn't mean you can't do what you want with the mutation engine.
Use maskprocessor to generate the rules:
Code:
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?1^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?1^?2^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?2^?1^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?2^?1^?2^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?2^?2^?1^?2^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?2^?1^?2^?2^?2^?2^?2 -o rules.txt
mp64 "-1 .|_" -2 ?l?d ^?2^?2^?2^?2^?2^?1^?2^?2^?2^?2^?2 -o rules.txt
...
Then just use those rules with the wordlist
This is one way of doing it.