Quantcast
Channel: hashcat Forum - All Forums
Viewing all articles
Browse latest Browse all 7675

A mask to match IPv4 maybe?

$
0
0
What is the proper way of brute-forcing hashes using all ipv4 addresses as plain-text passwords?

With oclHashcat it can be easily done using a combination mode and two dictionaries, you can read about it here
https://www.phillips321.co.uk/2012/04/04...p-address/

But combination mode for cpu hashcat is different, it takes only one dictionary and attacks with combinations of words in that dictionary.

A dictionary of all ip addresses is going to eat a real lot of disk space, so it is not a good solution. 

Another approach is to use many masks to match various ip formats, like this
?d.?d.?d.?d -> x.x.x.x
...
1?d?d.?d?d.?d?d?d.?d -> 1xx.xx.xxx.x
...
...
?d.?d?d?d.?d?d?d.?d -> x.xxx.xxx.x
...
and so on. 

However, such masks may also match invalid IPs, and it will take many sessions to check all masks. 

So I wonder if there is a more elegant solution.

Viewing all articles
Browse latest Browse all 7675

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>