Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: Mask + Brute Force with repeated password
Post: Mask + Brute Force with repeated password

Hey everyone, New to the forums here, and have found a bunch of great information so far!  I am just getting familiar with using masks and customs rules, and haven't been able to find an exact ans...
oompaloompa hashcat 8 6,271 02-22-2018, 01:10 AM
    Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password

I am attacking hash mode 14600 (LUKS), which I understand is relatively slow. Do you mind providing an example of what that would look like? I'm still learning my way around the commands
oompaloompa hashcat 8 6,271 02-22-2018, 06:41 PM
    Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password

How do I make a rule that doubles the word? So for example if my wordlist was: tree bottle canoe Then it would try: treetree bottlebottle canoecanoe If anyone can help me out on this, ...
oompaloompa hashcat 8 6,271 02-24-2018, 01:18 AM
    Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password

Thank you for the help, I was able to get this working, HOWEVER when my subpassword is 15 characters or longer, hashcat seems unable to apply the duplicate rule. Any ideas why hashcat would not be a...
oompaloompa hashcat 8 6,271 03-01-2018, 11:34 PM
    Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password

hashcat -a 6 wordlist.txt -1 ?l?u?d?s ?1?1?1?1 --increment --increment-min 1 --increment-max 4 --stdout --session mask | hashcat -r duplicate.rule --stdout --session duplicate | hashcat -m 14600 file....
oompaloompa hashcat 8 6,271 03-02-2018, 03:15 AM