You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You will need to bruteforce a 4 character domain completely, Once you get one cracked you will be able to use that template to crack other 4 letter domains quicker. See coreFunctions.py , function "attackTemplate()" . Only instead of using one of the predefined templates, you would be bruteforcing a massive keyspace 0x11111111111111111111-0xffffffffffffffffffff as an example. (poor example. im tired rn).
I also beleive the IDAT encoder is slightly off at the moment. I've been really busy to fix it. If you are set on getting a 4 letter domains reach out to me again and I can spend some time cracking them on one of my VPSs. Once a valid template is found It is fairly simple to begin building a "rainbow table" of valid domains if you will.
Any idea to how to go about for four characters domain support? How to go about adding that extra byte for the extra character in the domain name?
The text was updated successfully, but these errors were encountered: