Brute Force on WPA/WPA2 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old hashcat Support (https://hashcat.net/forum/forum-20.html) +--- Thread: Brute Force on WPA/WPA2 (/thread-1508.html) |
Brute Force on WPA/WPA2 - qwerty - 08-27-2012 Hi. I have problem with brute-force on hashcat-gui. When i was select hccap file and select brute-force (WPA/WPA) command is: Quote:cudaHashcat-plus64.exe --hash-type 2500 --attack-mode 3 C:\Users\qwerty\Desktop\9018_1346010557.hccapshow me this error: Quote:Usage: /\cudaHashcat-plus.exe [options]... hash|hashfile|hccapfile [dictionary|mask|directory]...What is wrong? What is correct specify a mask? RE: Brute Force on WPA/WPA2 - radix - 08-27-2012 You didn't specify a mask. RE: Brute Force on WPA/WPA2 - qwerty - 08-27-2012 (08-27-2012, 09:47 AM)radix Wrote: You didn't specify a mask.Yes, I know. But what it will be correct mask if i want break password with a...z, A...Z, 0...9 in all combinations? I don't understand this: http://hashcat.net/wiki/doku.php?id=mask_attack RE: Brute Force on WPA/WPA2 - tony - 08-27-2012 (08-27-2012, 05:05 PM)qwerty Wrote:(08-27-2012, 09:47 AM)radix Wrote: You didn't specify a mask.Yes, I know. But what it will be correct mask if i want break password with a...z, A...Z, 0...9 in all combinations? -1 ?l?u?d ?1?1?1?1?1 etc... -1 = custom_charset, same for -2, -3, -4 ?l : Lower_alpha or more specificaly = abcdefghijklmnopqrstuvwxyz ?u: UperCase or more specificaly = ABCDEFGHIJKLMNOPQRSTUVWXYZ ?d : Digits or more specificaly = 0123456789 & "?1" is the length so if you whant to BF an 4 Length one : ?1?1?1?1 RE: Brute Force on WPA/WPA2 - qwerty - 08-28-2012 Strange... My command is: cudaHashcat-plus64.exe --hash-type 2500 --attack-mode 3 --custom-charset1 ?l?u?d C:\Users\qwerty\Desktop\25388_1346083646.hccap ?1?1?1?1?1 and something is strange: Speed.....: 0 c/s Real, 0 c.s GPU Progress: 120804151/91632832 (13,19%) Rejected...: 12084151/120804151 (100%) HW.Monitor.#1: 0% GPU, 43c Temp RE: Brute Force on WPA/WPA2 - Pixel - 08-28-2012 (08-28-2012, 06:13 PM)qwerty Wrote: Strange... WPA key length is minimum of 8, you have set a mask of 5 and are getting rejected. cudaHashcat-plus64.exe --hash-type 2500 --attack-mode 3 --custom-charset1 ?l?u?d C:\Users\qwerty\Desktop\25388_1346083646.hccap ?1?1?1?1?1?1?1?1 |