hashcat Forum
Bruteforcing WPA - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html)
+--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html)
+--- Thread: Bruteforcing WPA (/thread-1210.html)



Bruteforcing WPA - Swirnoff - 05-26-2012

Hi! I'm trying to bruteforce a WPA hash with cudaHashcat-plus, and I'm suspecting the key to be a phone number. I'm only making this assumption based on the fact that most WEP networks that I cracked in the past use phone numbers as their wifi keys. Here it's a 10-digit numer, including the 3-digit area code. So how do I properly create a mask and charset strings, if for example, the first 3 digits are 707, followed by the rest of the phone number (707xxxxxxx)?
In other words, what exactly do I plug into the Mask and Charset1?
Is it "707?d?d?d?d?d?d?d" for the Mask; what about the Charset?

Thanx for your help in advance, because the manual is a bit confusing on the subject.


RE: Bruteforcing WPA - M@LIK - 05-26-2012

You should read the wiki more often.

You don't need any character's set, all you need is a Mask attack.
Code:
meow -m2500 -a3 [hccap_file] 707?d?d?d?d?d?d?d
Every ?d means a single digit.


RE: Bruteforcing WPA - Swirnoff - 05-26-2012

Wow this is unbelievable!!! I just cracked my first WPA!!!!!!!! Whohoooooo