Making Custom list for cracking

Note that increasing password length increases cracking duration by exponential time, while increasing password complexity (charset) only increases cracking duration by polynomial time.

This implies that a password policy encouraging longer passwords is more robust against cracking, compared to a password policy that encourages more-complex passwords.

Using Custom rule for cracking password is also known as rule-based attack.

Just for Demo purpose, Let's make wordlist from rockyou.txt wordlist.

# Run below commad.
# We are using sed to remove the numeric value from the list.
head /usr/share/wordlists/rockyou.txt > demo.txt ; sed -i '/^1/d' demo.txt ; cat demo.txt
This has list of functions which will help in making custom list or rules

Making Custom rule for password cracking

Step 1: Password list ready ?

Make list of possible passwords

We will need different list of password for different different engagement. So, Make list first.

For this Learning purpose, I will be using demo.txt (Which i made using command above).

Step 2: Making rule

Make Rule list.

This has list of functions which will help in making custom list or rules

Use above link to check for functions to make list.

Example of list:

Always use single quotes (') or a backslash (\) so that special characters are echoed into the text file as intended and not interpreted by the shell.

Step 3: Checking listing

Check the list of passwords with newly created rule.

Step 4: Using rule in Hashcat or john the ripper.

Using Rule with hashcat

If you want to use rule with Hashcat. It is very simple.

Buit-in Rule list can be found in below location:

ls -la /usr/share/hashcat/rules/

Using Rule with John the ripper

Last updated