hashcat Forum

Full Version: piping incremental JtR into hashcat to crack WPA2
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hey guys,

Trying to work out the command to pipe an incremental John the Ripper into hashcat plus to crack a WPA2 key. Is this even possible? All help is appreciated.
It should, yeah. I dont know the command for jtr incremental but this should inspire you:

./john --stdout | ./oclHashcat-plus -m 2500 ...
for "incremental" : --incremental:all

Or ./john -i:all

all = the name of the charset file, it can be one who come with JTR = alpha, alnum, lanman, digits, all
For great results, find a rockyou charset and use that.