Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The most useful attack seems missing #2670

Closed
cypherki opened this issue Dec 27, 2020 · 4 comments
Closed

The most useful attack seems missing #2670

cypherki opened this issue Dec 27, 2020 · 4 comments

Comments

@cypherki
Copy link

cypherki commented Dec 27, 2020

There is no rule that tells hashcat to not to try to crack a hash with a candidate with repeated characters. imho, it would shorten a lot some attacks.

pd: sorry if this isn't the best place to tell this but i dont know how to pull a request

@matrix
Copy link
Member

matrix commented Dec 29, 2020

hi, for repeated characters you mean sequential characters ?

example
seq = 2
ABCCDEFG <= dropped
ABCDEFGH <= accepted
ABCDABCD <= accepted

Let me known :)

@dkmc360
Copy link

dkmc360 commented Jan 2, 2021

Following. Some attacks can be reduced if the option is available for the mask attack.

@cypherki
Copy link
Author

hi, for repeated characters you mean sequential characters ?

example
seq = 2
ABCCDEFG <= dropped
ABCDEFGH <= accepted
ABCDABCD <= accepted

Let me known :)

Almost. I meant:

ABCCDEFG <= accepted
ABCDEFGH <= accepted
ABCDABCD <= dropped

@jsteube
Copy link
Member

jsteube commented Jun 3, 2021

It's not possible because the final keyspace is unknown. So this will work only in stdin mode. I recommend using maskprocessor using -r and then pipe this to hashcat.

@jsteube jsteube closed this as completed Jun 3, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants