Reader small image

You're reading from  Password Cracking with Kali Linux

Product typeBook
Published inFeb 2024
PublisherPackt
ISBN-139781835888544
Edition1st Edition
Right arrow
Author (1)
Daniel W. Dieterle
Daniel W. Dieterle
author image
Daniel W. Dieterle

Daniel W. Dieterle, with over 20 years in IT, has evolved from a system and network support role to a dedicated Computer Security Researcher and Author. His expertise, honed in diverse environments like corporate data centers and Ivy League schools, is reflected in his Kali Linux-based books, widely used globally for security training in universities, government, and private sectors. He has contributed to numerous technical books, articles, and security training classes, and is passionate about mentoring newcomers in the field.
Read more about Daniel W. Dieterle

Right arrow
Combining Two Wordlists
-a1 Combination Attacks - You can easily combine two wordlists using the -a1 command. This command will take every word from one list and combine it with every word from the second list. This is useful when users string together multiple words or strings in their passwords.
     hashcat  -m 0 [Uncracked.txt] -o [Cracked.txt] -a1 wordlist1 wordlist2 -O
Creates words like:
catdog
dogcat
Hashcat also gives you the capability to add a single character at the end or middle of a combined wordlist. You can do this with the “-j” or “-k” switches. This allows you to do things like combine wordlists while putting a space (or any single character) in between each word. You can do this using the “-j” switch:
     hashcat  -m 0 [Uncracked.txt] -o [Cracked.txt] -j$" " -a1 wordlist1 wordlist2 -O
This creates words like:
cat dog
dog cat
Combine wordlists with a “...
lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Password Cracking with Kali Linux
Published in: Feb 2024Publisher: PacktISBN-13: 9781835888544

Author (1)

author image
Daniel W. Dieterle

Daniel W. Dieterle, with over 20 years in IT, has evolved from a system and network support role to a dedicated Computer Security Researcher and Author. His expertise, honed in diverse environments like corporate data centers and Ivy League schools, is reflected in his Kali Linux-based books, widely used globally for security training in universities, government, and private sectors. He has contributed to numerous technical books, articles, and security training classes, and is passionate about mentoring newcomers in the field.
Read more about Daniel W. Dieterle