hashcat Forum
WPA Combination attack (skipping passwords) - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html)
+--- Thread: WPA Combination attack (skipping passwords) (/thread-4222.html)

WPA Combination attack (skipping passwords) - Alphadan - 03-26-2015

I'm using A combination attack that uses 2 dictionaries but it may combine passwords with less than 8 characters length which are meaningless in WPA... how can i make the attack skip these cases?.

just made a search in the forum, I read somewhere that hashcat skips then automatically when using WPA, but I have 24h+ testing this attack and in the status hashcat says 0.00% skipped password... which makes me wonder is it really skipping them?

can anyone confirm? and if that's the case how can i make hashcat to skip them.

Thx in advance.

RE: WPA Combination attack (skipping passwords) - Rolf - 03-29-2015

Try testing this on short wordlists(say, 100 passwords in each) and share the results.

RE: WPA Combination attack (skipping passwords) - atom - 03-30-2015

Since -a1 (and -a6 and -a7 as well) change the length of the password candidate on gpu, there's no way to skip them anymore. If you want them skipped, use combinator.bin from hashcat-utils and pipe