hashcat Forum
Need help cracking a wpa2 handshake - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html)
+--- Thread: Need help cracking a wpa2 handshake (/thread-4576.html)



Need help cracking a wpa2 handshake - smokey - 07-31-2015

I am trying to crack a 8 digit, lower case password, I normally brute force these within 1 day with 5 x 29 290x.

Today I learned that the passwords don't contain the characters I and o, and I could speed up my attack if I could get hashcat to ignore/skip those 2 characters.

Is this possible with the brute force attack or will I have to use a dictionary?
I don't even know what a rule based attack is so I hope this isnt going to be complicated.

thanks


RE: Need help cracking a wpa2 handshake - hawaii - 07-31-2015

You could use a custom charset with -1 a-Z and remove "l" and "o".


RE: Need help cracking a wpa2 handshake - smokey - 07-31-2015

thanks for the quick reply dude, I never thought it would be that easy.

I will fireup up my rig later today and test with the following command:

oclhashcat -m 2500 -a 3 capture.hccap ?l?l?l?l?l?l?l?l  -n 32 -1 abcde.....etc,etc and I will omit the I and the o.

Hashcat is awesome.

thanks mate.


RE: Need help cracking a wpa2 handshake - undeath - 07-31-2015

Your mask is using ?l. If you define a custom charset you should use it.


RE: Need help cracking a wpa2 handshake - hawaii - 07-31-2015

-1 qwertyuipasdfghjkzxcvbnm sets your charset. Use ?1 as the mask.


RE: Need help cracking a wpa2 handshake - smokey - 07-31-2015

Thanks for the follow up guys, I realised my mistake as soon as you pointed it out.

I don't know what the hell I would do without you guys.

thanks