Help understanding toggles and rules WPA - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: Help understanding toggles and rules WPA (/thread-4157.html) |
Help understanding toggles and rules WPA - tazdevil - 03-05-2015 I have been playing around with my own network for learning, if I set the WiFi password for keepoff1 (not very strong) it takes no time with a base dictionary. If I change the password to K3#p)ff1, how would I use the rules with oclhashcat to take a regular dictionary and adjust it? thanks in advance. RE: Help understanding toggles and rules WPA - undeath - 03-05-2015 here is an overview over all available rules: https://hashcat.net/wiki/doku.php?id=rule_based_attack RE: Help understanding toggles and rules WPA - tazdevil - 03-08-2015 I reviewed the wiki before posting, and was trying to understand how to take a regular keyboard output and utilize it and with an 8 character session. Basically take a in position 1 run it, then the following as it works through the 8 positions. RE: Help understanding toggles and rules WPA - atom - 03-08-2015 Rules is one way to do it. There's also the table-lookup attack which makes the processes easier, you don't have to write all the rules, just the translations. Quote:root@et:~/hashcat-0.50# cat wordlist.txt There's also some example table in the tables/ folder. If you want that attack with oclHashcat just pipe it: Quote:./hashcat-cli64.bin -a 5 -t my.table --stdout wordlist.txt | ./oclHashcat64.bin -m 2500 lala.hccap -w 3 |