Need help with rules/mask - WPA2 handshake - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: Need help with rules/mask - WPA2 handshake (/thread-3547.html) |
Need help with rules/mask - WPA2 handshake - insertt - 07-17-2014 Hello guys! I've been using oclHashcat with my amd GPU for a few months but only with my little understanding of what I read hashcat wiki. Since I've only tried basic rules, I now need your help to ensure that I apply the right restrictions(if possible) and also improve my knowledge of hash cat. So this is the information that I have to able to obtain the password of my wpa2 handshake via brute force:
So I want to convert,if possible, some of this information in a mask and that would make the process alot faster Right now the only code that I have is this one: Code: oclHashcat64.exe -m 2500 -a 3 --session=test --gpu-temp-abort=90 wpa2.hccap ?u?d?u?d?u?d?d?d?d?d Also I'm not sure if this randomize the letters position, or is only fixing the letters in the same spot like this :A0B1C23456 / D0E1F23456 RE: Need help with rules - WPA2 handshake - undeath - 07-17-2014 you can generate masks matching a policy using pack https://thesprawl.org/projects/pack/ RE: Need help with rules - WPA2 handshake - epixoip - 07-18-2014 the mask does not randomize the positions, no. a mask is a per-position character set, so only the character set used in each position will be tried. don't forget to add '-w 3' to your command line. RE: Need help with rules/mask - WPA2 handshake - insertt - 07-18-2014 (07-18-2014, 01:06 AM)epixoip Wrote: the mask does not randomize the positions, no. a mask is a per-position character set, so only the character set used in each position will be tried. I was afraid of that, so my mask right now is pretty useless because is way incomplete! Just tried the "-w 3" command, gave me 10000H/s more, thanks! =P Thought that knowing all this information could make me close to find the password but even if with some miracle I know where the current location for the 3 "A-Z" letters are it can take me 20 days to find it... is it normal? Because it will take me 20days vs 51masks = 1020 days =| I've manage to create all the masks (50+-) with the help of policygen for fun, thanks for the suggestion undeath! RE: Need help with rules/mask - WPA2 handshake - vrposter - 07-18-2014 I had a similar challenge (not WPA/WPA2), used PACK for generating the masks and the sed to clean up the ones I did not need/want. Tried this with your policies. keep in mind that a single AMD HD7970 does about 140,000 c/s on WPA/WPA2! If --pps is not specified in PACK it calculates with 1,000,000,000 So using your rules 1-3 and a part of rule #4 (never two letters in a row, so a minimum of 5 digits) I got Code: python policygen.py --pps 140000 --minlength 10 --maxlength 10 --minupper 1 --mindigit 5 --minlower 0 --minspecial 0 --maxupper 7 --maxdigit 10 --maxlower 0 --maxspecial 0 -o example.hcmask -q Then used sed to eliminate all mask-lines that contain at least one occurance of ?u?u Code: cat example.hcmask | sed -e '/?u?u/d' > example_clean.hcmask Got it down to 143 policy masks. I'd guess even getting it down to 143 masks, there is time for a giant coffee break. RE: Need help with rules/mask - WPA2 handshake - vrposter - 07-18-2014 One more, maybe I got it wrong. Your policy #3 says max of 3/4 uppers, rule #4 doesn't allow two upper in a row? So --maxupper should be 5. RE: Need help with rules/mask - WPA2 handshake - goat - 07-24-2014 Nice thread. I have a similar question. Someone may help me? Thank you very much Rules: Code: 1) length: 10 characters from UPPER HEX (0123456789ABCDEF) [/code] RE: Need help with rules/mask - WPA2 handshake - undeath - 07-24-2014 what exactly about the previous answers doesn't satisfy you? |