Custom Wordlists & Rules

Common Password Patterns

Users often follow predictable patterns when creating passwords:

  • First letter uppercase: Password

  • Adding numbers: Password123

  • Adding year: Password2022

  • Adding month: Password02

  • Exclamation at end: Password2022!

  • Special characters: P@ssw0rd2022!

OSINT for Password Creation

Collect information about target users:

  • Company name

  • Personal interests, hobbies

  • Pet names

  • Family members

  • Sports teams

  • Birth dates/years

  • Geographic location

Hashcat Rule Functions

Function
Description

:

Do nothing

l

Lowercase all letters

u

Uppercase all letters

c

Capitalize first letter, lowercase others

sXY

Replace all instances of X with Y

$!

Add exclamation at end

^X

Prepend character X

]

Delete last character

[

Delete first character

$1 $2 $3

Append digits

Creating Custom Rules

Example rule file:

Generating Wordlists with Rules

CeWL - Website Wordlist Generation

Targeted Password Attack Strategy

1. Information Gathering

  • Company website

  • Social media profiles

  • Employee LinkedIn profiles

  • Company documents/presentations

  • Geographic information

2. Base Wordlist Creation

3. Rule Creation for Password Policy

For policy: 12+ chars, uppercase, lowercase, symbol, number

4. Generation and Testing

Common Rule Files

  • best64.rule - 64 common transformations

  • rockyou-30000.rule - Based on rockyou analysis

  • T0XlC.rule - Advanced transformations

  • dive.rule - Comprehensive rule set

Tips for Custom Wordlists

  1. Start with OSINT - Gather target-specific information

  2. Consider password policy - Adapt rules to requirements

  3. Use company-specific terms - Include company name, products, locations

  4. Personal information - Names, dates, interests

  5. Geographic relevance - Local sports teams, landmarks

  6. Seasonal/temporal - Current year, month, season

  7. Industry-specific terms - Technical jargon, common terms

Example Workflow

Practical Example: Mark White Case Study

Target Information:

  • Name: Mark White

  • DOB: August 5, 1998

  • Company: Nexura Ltd

  • Location: San Francisco, CA

  • Pet: Bella (cat)

  • Family: Maria (wife), Alex (son)

  • Interest: Baseball

  • Password Policy: 12+ chars, uppercase, lowercase, symbol, number

Step 1: Create Base Wordlist

Step 2: Create Custom Rules

Rule Explanation:

  • c - Capitalize first character, lowercase rest

  • C - Lowercase first character, uppercase rest

  • t - Toggle case of all characters

  • $! - Append exclamation mark

  • $1$9$9$8 - Append '1998'

  • $1$9$9$8$! - Append '1998!'

  • sa@ - Replace 'a' with '@'

  • so0 - Replace 'o' with '0'

  • ss$ - Replace 's' with '$'

Step 3: Generate Mutated Wordlist

Step 4: Crack the Hash

Step 5: Retrieve Results

This approach successfully cracked Mark's password by combining:

  • Personal/professional information (OSINT)

  • Password policy requirements

  • Common password patterns

  • Targeted rule transformations


HTB Academy Custom Wordlists Workflow

Tools Installation

Real-World Scenario: Jane Smith

Target Information (OSINT):

  • Name: Jane Smith

  • Nickname: Janey

  • Birthdate: 11/12/1990

  • Partner: Jim (nickname: Jimbo, DOB: 12/12/1990)

  • Pet: Spot

  • Company: AHI

Step 1: Generate Username Variations

Step 2: CUPP Interactive Password Generation

Step 3: Password Complexity Filtering

Step 4: Targeted Brute Force Attack

Step 5: Success and Flag Retrieval


Advanced Filtering Techniques

Password Policy Compliance

Wordlist Quality Control

Targeted Attack Strategy Summary

  1. OSINT Collection - Personal/professional information

  2. Username Generation - username-anarchy variations

  3. Password Profiling - CUPP interactive generation

  4. Policy Filtering - grep compliance checking

  5. Targeted Attack - Hydra with custom wordlists

  6. Success Validation - Login and objective completion

Last updated