Hi,
I have a WPA2 handshake (hccap file) which I am doing tests on and I know the passphrase in advance, as I set it myself
There is clearly something wrong, and I am trying to figure out where the problem is.
System: GTX 970M with an i7 6700HQ, Hashcat 3.30
Let's assume the passphrase for that handshake is simply: Goldfreak123
When put that same passphrase in a custom.txt dictionary file, hashcat cracks it without issues.
However my goal is testing the rules functionality of hashcat. So I changed the passphrase in the custom.txt dictionary file to Goldfreak, and created a rule file (temprule.txt) with one entry as follow: $1 $2 $3
which will append 123 at the end of every passphrase.
I know the rule works because this command works:
hashcat64.exe -r temprule.txt --stdout custom.txt
The output is Goldfreak123 as expected.
However, the problem is that the rule-based attack itself does not work:
hashcat64.exe -m 2500 handshake.hccap -r D:\rules\temprule.txt D:\custom.txt
The wordlist or mask you are using is too small.
Therefore, hashcat is unable to utilize the full parallelization power of your device(s).
The cracking speed will drop.
Workaround: https://hashcat.net/wiki/doku.php?id=fre...full_speed
INFO: approaching final keyspace, workload adjusted
Session..........: hashcat
Status...........: Exhausted
Hash.Type........: WPA/WPA2
Hash.Target......: TestSSID (MAC_hidden <-> MAC_hiden)
Time.Started.....: Wed Feb 22 13:39:21 2017 (0 secs)
Time.Estimated...: Wed Feb 22 13:39:21 2017 (0 secs)
Input.Base.......: File (D:\custom.txt)
Input.Mod........: Rules (D:\rules\temprule.txt)
Input.Queue......: 1/1 (100.00%)
Speed.Dev.#1.....: 0 H/s (0.00ms)
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 1/1 (100.00%)
Rejected.........: 1/1 (100.00%)
Restore.Point....: 1/1 (100.00%)
Candidates.#1....: [Copying]
HWMon.Dev.#1.....: Temp: 47c Util: 99% Core:1037Mhz Mem:2505Mhz Lanes:16
Started: Wed Feb 22 13:39:18 2017
Stopped: Wed Feb 22 13:39:22 2017
Any ideas why the Rule attack is not working? I did delete the previous potfile.
I have a WPA2 handshake (hccap file) which I am doing tests on and I know the passphrase in advance, as I set it myself
There is clearly something wrong, and I am trying to figure out where the problem is.
System: GTX 970M with an i7 6700HQ, Hashcat 3.30
Let's assume the passphrase for that handshake is simply: Goldfreak123
When put that same passphrase in a custom.txt dictionary file, hashcat cracks it without issues.
However my goal is testing the rules functionality of hashcat. So I changed the passphrase in the custom.txt dictionary file to Goldfreak, and created a rule file (temprule.txt) with one entry as follow: $1 $2 $3
which will append 123 at the end of every passphrase.
I know the rule works because this command works:
hashcat64.exe -r temprule.txt --stdout custom.txt
The output is Goldfreak123 as expected.
However, the problem is that the rule-based attack itself does not work:
hashcat64.exe -m 2500 handshake.hccap -r D:\rules\temprule.txt D:\custom.txt
The wordlist or mask you are using is too small.
Therefore, hashcat is unable to utilize the full parallelization power of your device(s).
The cracking speed will drop.
Workaround: https://hashcat.net/wiki/doku.php?id=fre...full_speed
INFO: approaching final keyspace, workload adjusted
Session..........: hashcat
Status...........: Exhausted
Hash.Type........: WPA/WPA2
Hash.Target......: TestSSID (MAC_hidden <-> MAC_hiden)
Time.Started.....: Wed Feb 22 13:39:21 2017 (0 secs)
Time.Estimated...: Wed Feb 22 13:39:21 2017 (0 secs)
Input.Base.......: File (D:\custom.txt)
Input.Mod........: Rules (D:\rules\temprule.txt)
Input.Queue......: 1/1 (100.00%)
Speed.Dev.#1.....: 0 H/s (0.00ms)
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 1/1 (100.00%)
Rejected.........: 1/1 (100.00%)
Restore.Point....: 1/1 (100.00%)
Candidates.#1....: [Copying]
HWMon.Dev.#1.....: Temp: 47c Util: 99% Core:1037Mhz Mem:2505Mhz Lanes:16
Started: Wed Feb 22 13:39:18 2017
Stopped: Wed Feb 22 13:39:22 2017
Any ideas why the Rule attack is not working? I did delete the previous potfile.