In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-23 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)05/31 Report--
This article shows you what kind of rule-based attacks in Hashcat, the content is concise and easy to understand, can definitely brighten your eyes, through the detailed introduction of this article, I hope you can get something.
There is also an attack mode hidden in hashcat, which is also the most complex attack in hashcat, that is, rule-based (rule) attacks (- a 0). The combination of rules in hashcat and dictionaries can play an amazing role.
What are the rules?
The so-called rule is a programming language used to generate candidate passwords. the rule is composed of several functions with different functions, which are similar to regular expressions, but different from regular expressions. In short, the rule is a very flexible, convenient, and highly operational auxiliary tool.
In the rule syntax, different characters or symbols represent different functions, which can be combined according to the characteristics of the password waiting to be deciphered when writing the rules. The biggest advantage of using rules is that we can write corresponding rules according to the known password characteristics, which can process the contents of the dictionary into an appropriate form. Of course, the use of rules can also expand the content of the dictionary.
Examples of common rules
Note: the letters that make up the words in the hashcat dictionary are counted from 0 and are in hexadecimal form.
The following are some examples of common hashcat rule functions. To learn more about the rule functions of hashcat, please click here.
Function
Function
The rule applies an example input and output oXY to replace the character at position X with Yo2KdigapisdiKapisxNM to delete M characters from position N x23DigAipsDipsiNX inserts characters at position N Xi2LdIGAPISdILGAPIS*XY swap characters at XY * 0AIloveyoucharacters loveyouwords words I repeat the first N characters y48008208008800820C the first letter is lowercase, the rest uppercase CDigapisdIGAPISc capitalization, the rest lowercase cDIGPAISDigapist capitalization Lowercase to uppercase tDigApisdIGaPISr word flashback rDigApissipAgiDd repeat dDigDigDigf palindrome fDigDiggiD {loop left shift {DigApisigApisD} loop right move} DigApissDigApi [delete the first character [DigApisigApis] delete the last character] DigApisDigApi how to write the rule
When writing rules, you should first use your own requirements, and then write the rules according to the requirements. When writing rules, you should first make clear the composition and form of the password you need, and summarize the rules. Write rules based on known characteristics of the password.
A regular function in Hashcat, usually in the form of "oXY". The first bit represents the function name, the second bit represents the operation position, and the third represents the operation. Hashcat has its own rule files, which appear to be a string of irregular strings, but each string will perform complex operations on the characters in the dictionary.
Here are a few simple rules. I hope you can learn how to write your own rules by analyzing them. First of all, it should be clear that the functions in the rules are executed sequentially, and the scope of each function is every string in the dictionary. There is no relationship between the function and the function, and each function performs its own function. Of course, the functions of different functions can be superimposed.
Example: sa4 sb6 sc
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.