Rule-based attacks
Rule-based attacks/Hybrid Attacks
Tools: Hashcat, John the Ripper
examples:
cat /etc/john/john.conf | grep "List.Rules" | cut -d "." -f3 | cut -d ":" -f2 | cut -d "J" -f1 | awk NFjohn --wordlist=/tmp/wordlist.txt --rules=best64 --stdout | wc -lCUSTOM RULES
sudo nano /etc/john/john.conf[List.Rules:Example-attacks]
Az"[0-9]" ^[:@#$]echo "examplepass" > /tmp/single.lstLast updated