In penetration testing the worst part is authentication failure. Cracking a hash or a dictionary attack to an authentication form is time consuming. It depends on the strength of the password. An eight character password can have the possible combination of 6,634,204,312,890,625 including special char . Bruteforcing all the possible combination may take hours or days or even several years. seems ridiculous right? lets imagine a scenario, you know the half of the password or you are sure that the password has a specific name or word in it. you just have to find the rest of the characters which seems to be more practical
This command will generate a wordlist of 4 character with all possible combinations made my lower case alphabets. you can include alphanumeric and special chars and increase the max length for a gigantic wordlist. This gonna consume lot of disk space, better create small ones and rar it.
As said before if you know a part of the password or if its a combination some words you can have a look at this.
We can generate wordlist with both prefix and suffix words
# crunch 8 8 -t @@admin% -o /root/Desktop/wordlist.txt
# crunch 10 10 -t @@@admin%^^ -o /root/Desktop/wordlist.txt
Permutation of words instead of chars
Crunch will now generate approximately the following amount of data: 72 bytes
Crunch will now generate the following number of lines: 6