Cracking WPA Password with same time generating wordlist - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Cracking WPA Password with same time generating wordlist (/thread-10149.html) |
Cracking WPA Password with same time generating wordlist - Jimis 3:16 - 06-06-2021 Does anybody know the correct command for cracking a hash file on windows cmd with live generating wordlist?(not saved wordlist), containing all numbers, letters and symbols, 8-16 characters.. This works but I'm not able to save the process.. crunch_win %pass% abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 | hashcat64 -m %mode% --potfile-disable -o output.txt "%hash%" RE: Cracking WPA Password with same time generating wordlist - Xanadrel - 06-06-2021 Just use hashcat built-in mask attack: https://hashcat.net/wiki/doku.php?id=mask_attack RE: Cracking WPA Password with same time generating wordlist - slyexe - 06-06-2021 Make sure to use the latest version of hashcat as an initial step. Code: hashcat -m %mode% -i --increment-min 8 --increment-max 16 -a 3 -o output.txt %hash% ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a WPA being a slower hashrate will not be feasible with such a large keyspace after 12 characters unless you have some serious hardware. Also note, you specify using symbols in your initial statement but do not include it within crunch. If you are not using symbols modify your mask by using a custom character set with -1 and limit to ?l?u?d. Code: hashcat -m %mode% -1 ?l?u?d -i --increment-min 8 --increment-max 16 -a 3 -o output.txt %hash% ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1 RE: Cracking WPA Password with same time generating wordlist - Jimis 3:16 - 06-07-2021 (06-06-2021, 03:10 PM)slyexe Wrote: Make sure to use the latest version of hashcat as an initial step. Thanks, I need a little more help, assuming that I want It to search through all these:
|