Custom Wordlists & Rules
Common Password Patterns
OSINT for Password Creation
Hashcat Rule Functions
Function
Description
Creating Custom Rules
Generating Wordlists with Rules
CeWL - Website Wordlist Generation
Targeted Password Attack Strategy
1. Information Gathering
2. Base Wordlist Creation
3. Rule Creation for Password Policy
4. Generation and Testing
Common Rule Files
Tips for Custom Wordlists
Example Workflow
Practical Example: Mark White Case Study
Step 1: Create Base Wordlist
Step 2: Create Custom Rules
Step 3: Generate Mutated Wordlist
Step 4: Crack the Hash
Step 5: Retrieve Results
HTB Academy Custom Wordlists Workflow
Tools Installation
Real-World Scenario: Jane Smith
Step 1: Generate Username Variations
Step 2: CUPP Interactive Password Generation
Step 3: Password Complexity Filtering
Step 4: Targeted Brute Force Attack
Step 5: Success and Flag Retrieval
Advanced Filtering Techniques
Password Policy Compliance
Wordlist Quality Control
Targeted Attack Strategy Summary
Last updated