diff --git a/hate_crack.py b/hate_crack.py index 4623121..0685672 100755 --- a/hate_crack.py +++ b/hate_crack.py @@ -313,20 +313,23 @@ def hcatYoloCombination(hcatHashType, hcatHashFile): # Holden Combinator Attack def hcatHoldenCombinator(hcatHashType, hcatHashFile): - global hcatCombinationCount global hcatProcess - while 1: - hcatProcess = subprocess.Popen( - "{hcatBin} -m {hash_type} {hash_file} --remove -o {hash_file}.out -a 1 -j '$9' {word_lists}/rockyou.txt " - "{word_lists}/rockyou.txt {tuning} --potfile-path={hate_path}/hashcat.pot".format( - hcatBin=hcatBin, - hash_type=hcatHashType, - hash_file=hcatHashFile, - word_lists=hcatWordlists, - tuning=hcatTuning, - hate_path=hate_path), - shell=True).wait() - hcatCombinationCount = lineCount(hcatHashFile + ".out") - hcatHashCracked + with open({hate_path}/masks/holdenNum) as middle: + for line in middle: + print line + if 'str' in line: + break + + hcatProcess = subprocess.Popen( + "{hcatBin} -m {hash_type} {hash_file} --remove -o {hash_file}.out -a 1 -j '$9' {word_lists}/rockyou.txt " + "{word_lists}/rockyou.txt {tuning} --potfile-path={hate_path}/hashcat.pot".format( + hcatBin=hcatBin, + hash_type=hcatHashType, + hash_file=hcatHashFile, + word_lists=hcatWordlists, + tuning=hcatTuning, + hate_path=hate_path), + shell=True).wait() # Pathwell Mask Brute Force Attack @@ -340,7 +343,6 @@ def hcatPathwellBruteForce(hcatHashType, hcatHashFile): hash_file=hcatHashFile, tuning=hcatTuning, hate_path=hate_path), shell=True).wait() - print $hcatProcess # PRINCE Attack diff --git a/masks/holdenNum b/masks/holdenNum new file mode 100644 index 0000000..f55b5c9 --- /dev/null +++ b/masks/holdenNum @@ -0,0 +1,10 @@ +0 +1 +2 +3 +4 +5 +6 +7 +8 +9 \ No newline at end of file