Random creative password attacks using the power of stdin and 0 stdout. Not implying they're useful but to demonstrate the power of mixing and matching. Go forth and create something useful. These attacks can be facilitated with [[HashCat]] PRINCE-MDXFIND ATTACK ``` pp64.bin dict.txt I mdxfind -h ALL -f hash.txt -i 10 stdin > out.txt ``` HASHCAT-UTIL COMBONATOR PRINCE ``` combinator.bin dict.txt dict.txt I pp64.bin hashcat -a 0 -m hash.type hash.txt -r best64.rule ``` ``` combinator3.bin dict.txt dict.txt dict.txt I pp64.bin I hashcat -a 0 -m hash_type hash.txt -r rockyou-30000.rule ``` HASHCAT STDOUT ATTACKS PRINCE ``` hashcat -a 0 dict.txt -r dive.rule --stdout I pp64.bin I hashcat -a 0 -m hash_type hash.txt ``` ``` hashcat -a 6 dict.txt ?a?a?a?a --stdout I pp64.bin --pw-min=8 hashcat -a 0 -m hash_type hash.txt ``` ``` hashcat -a 7 ?a?a?a?a dict.txt --stdout I pp64.bin --pw-min=8 I hashcat -a 0 -m hash_type hash.txt ``` ``` hashcat -a 6 dict.txt rockyou-1-60.hcmask --stdout pp64.bin --pw-min=8 --pw max=14 I hashcat -a 0 -m #type hash.txt ``` ``` hashcat -a 7 rockyou-1-60.hcmask dict.txt --stdout I pp64.bin --pw-min=8 --pw max=14 I hashcat -a 0 -m hash_type hash.txt ``` [[Home]] #advanced