trustedsec / hate_crack

A tool for automating cracking methodologies through Hashcat from the TrustedSec team.
https://www.trustedsec.com
1.64k stars 259 forks source link

ls -rt -d -1 $PWD/{*,.*} >../wordlists.txt #23

Closed mother2110 closed 5 years ago

mother2110 commented 5 years ago

I have a folder with all my password files in it. I was trying to run... ls -rt -d -1 $PWD/{,.} >../wordlists.txt

but getting

[root:...testing/Passwords/wordlists]# ls bt4-password.txt darkweb2017-top1000.txt openwall.net-all.txt rockyou.txt cirt-default-passwords.txt darkweb2017-top100.txt PHP-Magic-Hashes.txt twitter-banned.txt clarkson-university-82.txt darkweb2017-top10.txt probable-v2-top12000.txt unkown-azul.txt darkc0de.txt Keyboard-Combinations.txt probable-v2-top1575.txt UserPassCombo-Jay.txt darkweb2017-top10000.txt Most-Popular-Letter-Passes.txt probable-v2-top207.txt

[root:...testing/Passwords/wordlists]# ls -rt -d -1 $PWD/{,.} >../wordlists.txt zsh: no matches found: /root/pentesting/Passwords/wordlists/.*

What am I doing wrong here??

Thanmks

bandrel commented 5 years ago

it is probably because of zsh. try using bash ls -rt -d -1 $PWD/{,.} >../wordlists.txt