NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - General Discussion - Mask and rules best attack


2 Results - Page 1 of 1 -
1
Author Message
Avatar
kevtheskin

Status: n/a
Joined: Wed, 21 Feb 2018
Posts: 269
Team:
Reputation: 159 Reputation
Offline
Thu, 07 Feb 2019 @ 20:31:17

Hello all, How can you tell what mask or rule did the best cracking when running an attack.

Cheers Kev


Avatar
dipeperon

Status: n/a
Joined: Tue, 03 Apr 2018
Posts: 329
Team:
Reputation: 398 Reputation
Offline
Thu, 07 Feb 2019 @ 21:42:12

Well, it's fairly easy to generate your own top masks and rules.

Just take a well cracked dump from hashes.org. Hashcat accepts plains so you don't even need to take the hashes.

Then push a large ruleset like dive.rule trough and enable rule debugging, for masks you can just run the plains trough ULM or any other mask generator for that matter.


My haschat stuff (rules, scripts): https://github.com/theherp/Hashcat-stuff
BTC: 3C2h4xscGRq7XfZLicoVjRVkYrqqJ1Urc5


2 Results - Page 1 of 1 -
1

We have a total of 180240 messages in 22360 topics.
We have a total of 20828 registered users.
Our newest registered member is Akosikurt.