Quantcast
Channel: hashcat Forum - All Forums
Viewing all articles
Browse latest Browse all 7822

Getting Stats on Rules and Masks for Analysis

$
0
0
I went through the wiki again just now to make sure it wasn't covered... and I couldn't find this specifically answered, not to say it wasn't. But I'm sure this is done regularly by many of you, and to date I've been doing analysis on known passwords to generate rules and masks but I haven't been doing analysis on the efficiency of rules and masks.

So what I'm wondering is if HC (or other tools with compatible rule/mask) can generate a stats file on the performance of the rule, ideally CSV, compared to known passwords?

Instead of using the rules and masks to generate hashes for comparison to other hashes I would like to have it compare the plaintexts of each rule and/or mask it generates against to a wordlist (known pws) and spit out:
combinations tried,words matched,% efficiency (matched/tried)

For example, the "8 character u-l-d-s compliant" is one I'd like to analyze, but geared to WPA. Since the speed on WPA is so slow it isn't practical to run the whole set of masks. But by getting a report on what masks had the highest efficiency against a word list (known PWs) I could whittle the keyspace down a lot. Off the top of my head I would not be surprised if a group of masks in there representing less than 10% of the total keyspace accounting for at least 20 or 30% of the matches.

I'm pretty sure this could be done by writing shell script to feed OHC one mask at a time from that rule file, but I was hoping maybe there was something like this already before I try to reinvent the wheel.

Viewing all articles
Browse latest Browse all 7822

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>