hashcat Forum
How to configure mask attack - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: General Help (https://hashcat.net/forum/forum-8.html)
+--- Thread: How to configure mask attack (/thread-1852.html)



How to configure mask attack - Znerox - 12-20-2012

I'm trying to do a mask attack on a WPA hash, as described here http://hashcat.net/wiki/doku.php?id=mask_attack . How do I set it up to try all lowercase alphanumeric characters and a password of 1-8 characters? And what kind of performance can I expect on a Nvidia GTX285 (Windows 7). Currently I'm getting about 13k/sec with the newest driver (310.70). Thanks


RE: How to configure mask attack - epixoip - 12-20-2012

define a custom charset that contains both loweralpha and digits, then build your mask with that custom charset. e.g.,

Code:
-1 ?l?d ?1?1?1?1?1?1?1?1

you can expect it to be slow as dogshit.


RE: How to configure mask attack - Znerox - 12-21-2012

Thanks. Now one more stupid question, I presume that if I have multiple WPA hashes in a single file, hashcat will try each password on all hashes simultaneously? How do I get all the hashes in the same file? When I use the -J option in aircrack-ng I can only export one handshake at a time. Is there a way to combine the hashes from multiple .hccap files to one?


RE: How to configure mask attack - M@LIK - 12-21-2012

hccap files can only contain one handshake. It's impossible to crack more than one handshake using -plus, unless you run more than one instance (with different hccap files).

I don't know how to tell aircrack-ng what handshake to convert, but I think you can work something out using pyrit.


RE: How to configure mask attack - Znerox - 12-21-2012

I see. Converting each handshake to hccap from one airodump file is no problem, I just hoped there was a more efficient way to crack the hashes than to run them one at a time. But thanks anyway Smile


RE: How to configure mask attack - atom - 12-23-2012

This is simply not possible because of the salt (ESSID) that is used by WPA/WPA2.