How to make combipow output directly to hashcat so I don't have to save a giant file - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip (https://hashcat.net/forum/forum-28.html) +--- Thread: How to make combipow output directly to hashcat so I don't have to save a giant file (/thread-10046.html) |
How to make combipow output directly to hashcat so I don't have to save a giant file - Super_X - 04-28-2021 So, I'm trying to crack a WPA password that has around 8-18 chacharacters. I now 2 words that too likely are in the password, and knowing a bit of the old password I'm almost sure it hase both Lower and Uppercase alphanumeric characters. The problem is, as the combipow.exe says to me when I try to make a list as big as this, it would just be giant. So, how can I output combipow.exe list directly as the same time as the WPA hashcat crack is happening? Also, how could I bypass the 64 line limit for this? (Maybe changing the code and recompiling?) Thank You RE: How to make combipow output directly to hashcat so I don't have to save a giant file - Chick3nman - 04-28-2021 Just pipe from combipow to hashcat. Run hashcat in -a 0 without specifying a dictionary and it will listen on stdin.` combipow [options] | hashcat -a 0 -m 22000 stuff.hash` I dont know what you mean by 64 line limit though, there's no line limitation in hashcat? |