Need help cracking a wpa2 handshake - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: Need help cracking a wpa2 handshake (/thread-4576.html) |
Need help cracking a wpa2 handshake - smokey - 07-31-2015 I am trying to crack a 8 digit, lower case password, I normally brute force these within 1 day with 5 x 29 290x. Today I learned that the passwords don't contain the characters I and o, and I could speed up my attack if I could get hashcat to ignore/skip those 2 characters. Is this possible with the brute force attack or will I have to use a dictionary? I don't even know what a rule based attack is so I hope this isnt going to be complicated. thanks RE: Need help cracking a wpa2 handshake - hawaii - 07-31-2015 You could use a custom charset with -1 a-Z and remove "l" and "o". RE: Need help cracking a wpa2 handshake - smokey - 07-31-2015 thanks for the quick reply dude, I never thought it would be that easy. I will fireup up my rig later today and test with the following command: oclhashcat -m 2500 -a 3 capture.hccap ?l?l?l?l?l?l?l?l -n 32 -1 abcde.....etc,etc and I will omit the I and the o. Hashcat is awesome. thanks mate. RE: Need help cracking a wpa2 handshake - undeath - 07-31-2015 Your mask is using ?l. If you define a custom charset you should use it. RE: Need help cracking a wpa2 handshake - hawaii - 07-31-2015 -1 qwertyuipasdfghjkzxcvbnm sets your charset. Use ?1 as the mask. RE: Need help cracking a wpa2 handshake - smokey - 07-31-2015 Thanks for the follow up guys, I realised my mistake as soon as you pointed it out. I don't know what the hell I would do without you guys. thanks |