Bruteforcing WPA - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html) +--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html) +--- Thread: Bruteforcing WPA (/thread-1210.html) |
Bruteforcing WPA - Swirnoff - 05-26-2012 Hi! I'm trying to bruteforce a WPA hash with cudaHashcat-plus, and I'm suspecting the key to be a phone number. I'm only making this assumption based on the fact that most WEP networks that I cracked in the past use phone numbers as their wifi keys. Here it's a 10-digit numer, including the 3-digit area code. So how do I properly create a mask and charset strings, if for example, the first 3 digits are 707, followed by the rest of the phone number (707xxxxxxx)? In other words, what exactly do I plug into the Mask and Charset1? Is it "707?d?d?d?d?d?d?d" for the Mask; what about the Charset? Thanx for your help in advance, because the manual is a bit confusing on the subject. RE: Bruteforcing WPA - M@LIK - 05-26-2012 You should read the wiki more often. You don't need any character's set, all you need is a Mask attack. Code: meow -m2500 -a3 [hccap_file] 707?d?d?d?d?d?d?d RE: Bruteforcing WPA - Swirnoff - 05-26-2012 Wow this is unbelievable!!! I just cracked my first WPA!!!!!!!! Whohoooooo |