Random creative password attacks using the power of stdin and 0
stdout. Not implying they're useful but to demonstrate the power of mixing and matching. Go forth and create something useful.
These attacks can be facilitated with [[HashCat]]
PRINCE-MDXFIND ATTACK
```
pp64.bin dict.txt I mdxfind -h ALL -f hash.txt -i 10 stdin > out.txt
```
HASHCAT-UTIL COMBONATOR PRINCE
```
combinator.bin dict.txt dict.txt I pp64.bin hashcat -a 0 -m hash.type hash.txt -r best64.rule
```
```
combinator3.bin dict.txt dict.txt dict.txt I pp64.bin I hashcat -a 0 -m hash_type hash.txt -r rockyou-30000.rule
```
HASHCAT STDOUT ATTACKS PRINCE
```
hashcat -a 0 dict.txt -r dive.rule --stdout I pp64.bin I hashcat -a 0 -m hash_type hash.txt
```
```
hashcat -a 6 dict.txt ?a?a?a?a --stdout I pp64.bin --pw-min=8 hashcat -a 0 -m hash_type hash.txt
```
```
hashcat -a 7 ?a?a?a?a dict.txt --stdout I pp64.bin --pw-min=8 I hashcat -a 0 -m hash_type hash.txt
```
```
hashcat -a 6 dict.txt rockyou-1-60.hcmask --stdout pp64.bin --pw-min=8 --pw max=14 I hashcat -a 0 -m #type hash.txt
```
```
hashcat -a 7 rockyou-1-60.hcmask dict.txt --stdout I pp64.bin --pw-min=8 --pw max=14 I hashcat -a 0 -m hash_type hash.txt
```
[[Home]]
#advanced