Thanks for sharing! At first glance this appears to be very well done.
(08-15-2014, 02:15 PM)epixoip Wrote: [ -> ]Thanks for sharing! At first glance this appears to be very well done.
Thanks! I've been using method 2 and getting good results for my purposes, but I'm far from an expert at password cracking. If anyone uses this I'd love to hear feedback.
Btw using -a 1 is the same as the combinator mode, this way you may save some wordlist space plus you have a nice multiplicator option for fast hashes
(08-15-2014, 04:44 PM)atom Wrote: [ -> ]Btw using -a 1 is the same as the combinator mode, this way you may save some wordlist space plus you have a nice multiplicator option for fast hashes
very cool! I was trying to leverage rules, but after looking at this,
https://hashcat.net/forum/thread-2391.html, I noticed that there are several ways to accomplish the same thing.
Just so I understand, with combinator mode can I input my seed file of 4 length walks and expand them into length 16? I currently get good results with combining the seed file into length 8 then again to 16, but if oclHashcat does this out of the box I'll use that instead.
Using the hashcat-utils' combinator.exe is likely quicker than combinator.py.
And the new (but undocumented) combinator3.exe creates the in-between 12 character combinations, e.g.:
>combinator3.exe 4_walk_seed.txt 4_walk_seed.txt 4_walk_seed.txt > 12charwalk.txt
Another interesting idea is using the tmesis.pl from Yiannis Chrysanthou's (aka T0XlC) "I have the #cat so I make the rules" presentation at the recent Passwords Con 2014 Las Vegas. (Also in the new, but undocumented hashcat-utils.)
(08-16-2014, 02:17 PM)Kgx Pnqvhm Wrote: [ -> ]Using the hashcat-utils' combinator.exe is likely quicker than combinator.py.
And the new (but undocumented) combinator3.exe creates the in-between 12 character combinations, e.g.:
>combinator3.exe 4_walk_seed.txt 4_walk_seed.txt 4_walk_seed.txt > 12charwalk.txt
Another interesting idea is using the tmesis.pl from Yiannis Chrysanthou's (aka T0XlC) "I have the #cat so I make the rules" presentation at the recent Passwords Con 2014 Las Vegas. (Also in the new, but undocumented hashcat-utils.)
I agree that combinator.exe is most likely quicker than combinator.py, and I'll give combinator3.exe a try and see how that works out.
Is the talk from T0XIC available somewhere to view?