How to configure mask attack - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: General Help (https://hashcat.net/forum/forum-8.html) +--- Thread: How to configure mask attack (/thread-1852.html) |
How to configure mask attack - Znerox - 12-20-2012 I'm trying to do a mask attack on a WPA hash, as described here http://hashcat.net/wiki/doku.php?id=mask_attack . How do I set it up to try all lowercase alphanumeric characters and a password of 1-8 characters? And what kind of performance can I expect on a Nvidia GTX285 (Windows 7). Currently I'm getting about 13k/sec with the newest driver (310.70). Thanks RE: How to configure mask attack - epixoip - 12-20-2012 define a custom charset that contains both loweralpha and digits, then build your mask with that custom charset. e.g., Code: -1 ?l?d ?1?1?1?1?1?1?1?1 you can expect it to be slow as dogshit. RE: How to configure mask attack - Znerox - 12-21-2012 Thanks. Now one more stupid question, I presume that if I have multiple WPA hashes in a single file, hashcat will try each password on all hashes simultaneously? How do I get all the hashes in the same file? When I use the -J option in aircrack-ng I can only export one handshake at a time. Is there a way to combine the hashes from multiple .hccap files to one? RE: How to configure mask attack - M@LIK - 12-21-2012 hccap files can only contain one handshake. It's impossible to crack more than one handshake using -plus, unless you run more than one instance (with different hccap files). I don't know how to tell aircrack-ng what handshake to convert, but I think you can work something out using pyrit. RE: How to configure mask attack - Znerox - 12-21-2012 I see. Converting each handshake to hccap from one airodump file is no problem, I just hoped there was a more efficient way to crack the hashes than to run them one at a time. But thanks anyway RE: How to configure mask attack - atom - 12-23-2012 This is simply not possible because of the salt (ESSID) that is used by WPA/WPA2. |