Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Cracking hash
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hi, is there any expert who has experience to crack? I'm a beginner, for someone these questions can be stupid. I know I'm stupid. : D
1. Is it enough if I only have a rockyou list?
2. I try to crack  hash ([hashes removed])-its 'easyrule' but it won't break  and writes me exhausted. How do I break it?
3.How do these rules work?
1.best64.rule
2.combinator.rule
3.d3ad0ne.rule
4.dive.rule
5.generated.rule
6.generated2.rule
7.Hybrid
8.Incisive-
leetspeak.rule
9.InsidePro-HashManager.rule
10.InsidePro-PasswordsPro.rule
11.leetspeak.rule
12.oscommerce.rule
13.rockyou-30000.rule
14.specific.rule
15.T0XlC.rule
16.T0XlC-insert_00-99_1950-2050_toprules_0_F.rule
17.TXXC-insert_space_and_special_0_F.rule
18.T0XlC-insert_top_100_passwords_1_G.rule
19.T0XlCv1.rule
20.toggles1-5.rule
21.unix-ninja-leetspeak.rule
22.Do you have any tips on which rules are best?, and some wordlists i should use?
I tend to use "probablistic" wordlists, ie here : https://github.com/berzerk0/Probable-Wor...-Passwords - which is meant to be a list in decreasing frequency order. 

And something like nsav2 here - https://github.com/NSAKEY/nsa-rules/blob....dive.rule - from  https://github.com/NSAKEY/nsa-rules 

But it really depends on the hash type and how quickly you can make individual guesses.