NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - General Discussion - Mask and rules best attack

WARNING!
Due to the number of SCAMS going on in the PAID forum, PLEASE ask an ADMIN or MODERATOR to verify ALL found passwords to ensure you are not being SCAMMED.
DO NOT PAY until an ADMIN or MOD has verified them for you!


2 Results - Page 1 of 1 -
1
Author Message
Avatar
kevtheskin

Status: n/a
Joined: Wed, 21 Feb 2018
Posts: 217
Team:
Reputation: 88 Reputation
Offline
Thu, 07 Feb 2019 @ 20:31:17

Hello all, How can you tell what mask or rule did the best cracking when running an attack.

Cheers Kev


Avatar
dipeperon

Status: n/a
Joined: Tue, 03 Apr 2018
Posts: 285
Team:
Reputation: 380 Reputation
Online
Thu, 07 Feb 2019 @ 21:42:12

Well, it's fairly easy to generate your own top masks and rules.

Just take a well cracked dump from hashes.org. Hashcat accepts plains so you don't even need to take the hashes.

Then push a large ruleset like dive.rule trough and enable rule debugging, for masks you can just run the plains trough ULM or any other mask generator for that matter.


My haschat stuff (rules, scripts): https://github.com/theherp/Hashcat-stuff
BTC: 3C2h4xscGRq7XfZLicoVjRVkYrqqJ1Urc5


2 Results - Page 1 of 1 -
1

We have a total of 170576 messages in 21366 topics.
We have a total of 19406 registered users.
Our newest registered member is Jeans.