## D3adH0b0 Rules ## #d3adhob0 This ruleset is much more extensive and utilizes many common password structure ideas seen across every industry. Looking to spend several hours to crack many more hashes? Use this list. ``` hashcat -a 0 -m 1000 <NTLMHASHES> wordlists/english.txt -r d3adhob0.rule -o cracked.txt ``` #hob064 This ruleset contains 64 of the most frequent password patterns used to crack passwords. Need a hash cracked quickly to move on to more testing? Use this list. ``` hashcat -a 0 -m 1000 <NTLMHASHES> wordlists/rockyou.txt -r hob064.rule -o cracked.txt ``` ## KoreLogic Rules ## #KoreLogic These rules were originally created for the tool John the Ripper. KoreLogic performed a very rough translation to rules that can be understood by the 'hashcat' tool. The rules below can be downloaded, placed in hashcat's /rules/ directory and accessed via the command line using the -r command line option. This is _not_ a complete list of all rules that was used for the contest, but a subset of rules that were easy to convert to hashcat format. ## Not_So_Secure Rules ## #OneRuletoRuleThemAll The rule file is a combination of rules from various sources: 1. [https://github.com/praetorian-inc/Hob0Rules](https://github.com/praetorian-inc/Hob0Rules) (d3adhob0.rule, hob064.rule) 2. [http://contest-2010.korelogic.com/rules-hashcat.html](http://contest-2010.korelogic.com/rules-hashcat.html) (KoreLogicRulesPrependRockYou50000) 3. [https://github.com/NSAKEY/nsa-rules](https://github.com/NSAKEY/nsa-rules) (_NSAKEY.v2.dive.rule) 4. [https://github.com/hashcat/hashcat/](https://github.com/hashcat/hashcat/) oclHashcat v1.20 (by [https://github.com/evilmog](https://github.com/evilmog)) (generated2.rule) ## NSA_rules #_NSAKEYv1diverule is the first version of the rule set which was used to compete against dive.rule. It has 123289 rules, just like the real dive.rule. #_NSAKEYv2diverule is the improved version of an attempt to compete against dive.rule. You can use "head -n X" (With X being a number between 1 and 123289) and the output to another file if you want to create a smaller rule set. #nsa64rule  is the first 64 rules from _NSAKEY.v2.dive.rule. For the record, it cracked 42% of the Battlefield Heroes Beta hashes. best64.rule is unquestionably better, but maybe this set of rules will be helpful to someone. [[Home]] #rules