Custom Wordlists & Rules
Common Password Patterns
Users often follow predictable patterns when creating passwords:
First letter uppercase: Password
Adding numbers: Password123
Adding year: Password2022
Adding month: Password02
Exclamation at end: Password2022!
Special characters: P@ssw0rd2022!
OSINT for Password Creation
Collect information about target users:
Company name
Personal interests, hobbies
Pet names
Family members
Sports teams
Birth dates/years
Geographic location
Hashcat Rule Functions
:
Do nothing
l
Lowercase all letters
u
Uppercase all letters
c
Capitalize first letter, lowercase others
sXY
Replace all instances of X with Y
$!
Add exclamation at end
^X
Prepend character X
]
Delete last character
[
Delete first character
$1 $2 $3
Append digits
Creating Custom Rules
Example rule file:
Generating Wordlists with Rules
CeWL - Website Wordlist Generation
Targeted Password Attack Strategy
1. Information Gathering
Company website
Social media profiles
Employee LinkedIn profiles
Company documents/presentations
Geographic information
2. Base Wordlist Creation
3. Rule Creation for Password Policy
For policy: 12+ chars, uppercase, lowercase, symbol, number
4. Generation and Testing
Common Rule Files
best64.rule- 64 common transformationsrockyou-30000.rule- Based on rockyou analysisT0XlC.rule- Advanced transformationsdive.rule- Comprehensive rule set
Tips for Custom Wordlists
Start with OSINT - Gather target-specific information
Consider password policy - Adapt rules to requirements
Use company-specific terms - Include company name, products, locations
Personal information - Names, dates, interests
Geographic relevance - Local sports teams, landmarks
Seasonal/temporal - Current year, month, season
Industry-specific terms - Technical jargon, common terms
Example Workflow
Practical Example: Mark White Case Study
Target Information:
Name: Mark White
DOB: August 5, 1998
Company: Nexura Ltd
Location: San Francisco, CA
Pet: Bella (cat)
Family: Maria (wife), Alex (son)
Interest: Baseball
Password Policy: 12+ chars, uppercase, lowercase, symbol, number
Step 1: Create Base Wordlist
Step 2: Create Custom Rules
Rule Explanation:
c- Capitalize first character, lowercase restC- Lowercase first character, uppercase restt- Toggle case of all characters$!- Append exclamation mark$1$9$9$8- Append '1998'$1$9$9$8$!- Append '1998!'sa@- Replace 'a' with '@'so0- Replace 'o' with '0'ss$- Replace 's' with '$'
Step 3: Generate Mutated Wordlist
Step 4: Crack the Hash
Step 5: Retrieve Results
This approach successfully cracked Mark's password by combining:
Personal/professional information (OSINT)
Password policy requirements
Common password patterns
Targeted rule transformations
HTB Academy Custom Wordlists Workflow
Tools Installation
Real-World Scenario: Jane Smith
Target Information (OSINT):
Name: Jane Smith
Nickname: Janey
Birthdate: 11/12/1990
Partner: Jim (nickname: Jimbo, DOB: 12/12/1990)
Pet: Spot
Company: AHI
Step 1: Generate Username Variations
Step 2: CUPP Interactive Password Generation
Step 3: Password Complexity Filtering
Step 4: Targeted Brute Force Attack
Step 5: Success and Flag Retrieval
Advanced Filtering Techniques
Password Policy Compliance
Wordlist Quality Control
Targeted Attack Strategy Summary
OSINT Collection - Personal/professional information
Username Generation - username-anarchy variations
Password Profiling - CUPP interactive generation
Policy Filtering - grep compliance checking
Targeted Attack - Hydra with custom wordlists
Success Validation - Login and objective completion
Last updated