hashcat Forum

Full Version: [ANSWERED] New user, custom brute force help
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
I'm trying to decrypt 2500 WPA2
Not much to go on to help you here.

Please also note that you're not 'decrypting' - there is no 'reversing' or 'decrypting' of true hashes. Hashes are not encryption. When you're trying to crack a hash, you're hashing many strings until a hash matches the hash you have.
you won't complete that brute force attack within your lifetime with a single high end gpu.
(05-12-2018, 07:56 PM)h1430210 Wrote: [ -> ]For 10 digits using no numbers, uppercase letters, lowercase letters, @, #, and $,
You would use

hashcat -a 3 -m<whatever it is> <hashfile> -1 ?l?u@#$ ?1?1?1?1?1?1?1?1?1?1

Thanks man ! gota put the rig to work now ! Estimated time to crack password 2 years lol
(05-14-2018, 12:07 AM)cryptozin Wrote: [ -> ]
(05-12-2018, 07:56 PM)h1430210 Wrote: [ -> ]For 10 digits using no numbers, uppercase letters, lowercase letters, @, #, and $,
You would use

hashcat -a 3 -m<whatever it is> <hashfile> -1 ?l?u@#$ ?1?1?1?1?1?1?1?1?1?1

Thanks man ! gota put the rig to work now ! Estimated time to crack password 2 years lol

Is there a way to save the cracking progress? In case of pc crash or energy down etc? So doesn`t have to start over?
Yep, that happens automatically - state is saved periodically to a restore file, and you use --restore to restore.
(05-14-2018, 12:59 AM)royce Wrote: [ -> ]Yep, that happens automatically - state is saved periodically to a restore file, and you use --restore to restore.

Nice ! Thanks Royce.
Pages: 1 2