hashcat Forum
WPA2 Bruteforce. - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html)
+--- Thread: WPA2 Bruteforce. (/thread-4533.html)



WPA2 Bruteforce. - Zardozx - 07-17-2015

Hi Guys,

I am trying to brute-force my WPA 8 Char password, after successfully capturing the handshake and transferring it to a hccp file, I went on to calculate the time it would take to brute-force an 8 char alpha lower case password from (a-z)  using my GPU @ 80,000 H/s, which came up to 30 days and 5 hours which is a long time. Later on I found out that the default passwords for my type of routers have the letter (i) and (o) omitted so that narrowed it down to 24 chars powered by 8 which comes to 110 billion possible combinations. And when I started it up on oclhashcat it went dramatically down to 15 days. I still think 15 days to crack a default password is a bit long and I want to narrow it down even more. I kept on researching and found that the default password on my router doesn't have 3 consecutive letters for example  "aaa"bcced. "a" being the repetitive letter, so the question is whats the command on oclhashcat to be able to narrow it down even more. And please provide examples as I am new to this. I am so determined to crack my password I don't know why. but I enjoy doing things like that.

Thanks,

Zardozx


RE: WPA2 Bruteforce. - undeath - 07-17-2015

If you need to match such password policies you will need to use PACK https://thesprawl.org/projects/pack/


RE: WPA2 Bruteforce. - atom - 07-18-2015

To skip repetitive letters you need maskprocessor and pipe the output. Use the -q option to specify number of repetitive letters