Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: maskprocessor -- reversing increments
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hey all, I have been playing around with maskprocessor emulating bruteforce and was wondering whether
it is possible to reverse the incrementation.

I'll try to explain what I am trying as best as possible ;

If we know that the first 4 characters of an 8-10 character WPA passphrase are 'abcd' followed by
lower alpha characters then you would be able to start maskprocessor with increments as follows ;
Code:
mp64.exe -i --increment-min=8 abcd?l?l?l?l?l?l
result: abcdaaaa -- abcdzzzzzz

If on the other hand you know that the last 4 characters are for instance 'wxyz' is there a way to have the
first characters increment from 4 to 6 characters or is manual the only way to go ?

as
Code:
mp64.exe -i --increment-min=8 ?l?l?l?l?l?lwxyz
of course starts by taking the first 8 characters which excludes the last 2 characters of what I would want fixed.

I am not sure if this is even possible, but I am a complete newb with maskprocessor,
so any guidance from the pros much appreciated !
Why not using a rule? Something like this should work:

echo $w$x$y$z > rule

mp64 -i ?l?l?l?l?l?l | oclHashcat-plus64 -r rule -m 2500 ...
Thats great Atom thanks !

I am starting a blogpost on maskprocessor in view of the incremental bruteforce capabilities to follow
up on a previous post I did on wpa + oclhashcat .
Hadn't yet started on looking closely at rule making, but that will be my next endeavour Wink

From a quick test it does seem to do exactly what I wanted, thanks for your quick help !