-
Notifications
You must be signed in to change notification settings - Fork 2
/
DictionaryAttack.sh
44 lines (40 loc) · 2.52 KB
/
DictionaryAttack.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
#!/bin/bash
# Variables
RuleDir=./rules # no trailing slash on path!
WordList=$3
HashToCrack=$1
HashType=$2
hashcatbin=/opt/hashcat/hashcat64.bin
ResultFile=./cracked-$1
# start running hashcat dictionary attack
$hashcatbin -m$HashType -a0 -r $RuleDir/combinator.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/best64.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/specific.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/leetspeak.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/toggles1.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/hob064.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/toggles2.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/oscommerce.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/T0XlC-insert_space_and_special_0_F.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/toggles3.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/toggles4.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/T0XlC-insert_top_100_passwords_1_G.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/InsidePro-PasswordsPro.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/toggles5.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/T0XlC-insert_00-99_1950-2050_toprules_0_F.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/T0XlC.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/Ninja-leetspeak.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/InsidePro-HashManager.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/T0XlCv1.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/generated.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/Incisive-leetspeak.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/rockyou-30000.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/d3ad0ne.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/d3adhob0.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/generated2.rule $HashToCrack $WordList
$hashcatbin -m$HashType -a0 -r $RuleDir/dive.rule $HashToCrack $WordList
# output cracked passwords
echo "Hashcat dictionary attack completed, outputing results to '$ResultFile'"
# grep ':' is used to remove the info on the first few lines
$hashcatbin --show -m$HashType $HashToCrack > $ResultFile
# end