hashcat Forum
piping incremental JtR into hashcat to crack WPA2 - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html)
+--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html)
+--- Thread: piping incremental JtR into hashcat to crack WPA2 (/thread-1486.html)



piping incremental JtR into hashcat to crack WPA2 - Night_Reaper - 08-21-2012

Hey guys,

Trying to work out the command to pipe an incremental John the Ripper into hashcat plus to crack a WPA2 key. Is this even possible? All help is appreciated.


RE: piping incremental JtR into hashcat to crack WPA2 - atom - 08-21-2012

It should, yeah. I dont know the command for jtr incremental but this should inspire you:

./john --stdout | ./oclHashcat-plus -m 2500 ...


RE: piping incremental JtR into hashcat to crack WPA2 - tony - 08-22-2012

for "incremental" : --incremental:all

Or ./john -i:all

all = the name of the charset file, it can be one who come with JTR = alpha, alnum, lanman, digits, all


RE: piping incremental JtR into hashcat to crack WPA2 - me.scotty - 08-22-2012

For great results, find a rockyou charset and use that.


RE: piping incremental JtR into hashcat to crack WPA2 - atom - 08-22-2012

Or try this: https://hashcat.net/forum/thread-1291.html