Help with cracking a WPA - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Help with cracking a WPA (/thread-5835.html) |
Help with cracking a WPA - rln11 - 09-04-2016 I'm trying to construct a command line to crack a WPA2. Facts I know about this WPA2: 1) it is 10 digits, digits only 2) the first 4 digits are 9999 So at first I created: hashcat64 -m 2500 -a 3 -1 9999?d?d?d?d?d?d test.hccap which gave me a result with an obscene about of time to complete on my 970, which I think is incorrect. It was a year +. Next I tried removing the -1 which obviously won't work because hashcat thinks the 9999?d?d?d?d?d?d should be a file. So hear I am looking for some assistance constructing the proper command line for this. Any direction would be greatly appreciated. Thanks. RE: Help with cracking a WPA - jodler303 - 09-04-2016 use this: Code: hashcat64 -w 4 -m 2500 test.hccap -a 3 9999?d?d?d?d?d?d -1 is used to define a custom charset, you dont need it because ?d is already enough for digits-only. nevertheless here is a correct -1 example: Code: hashcat64 -w 4 -m 2500 test.hccap -a 3 -1 abcdef?d 9999?1?1?1?1?1?1 this defines lowercase hex (abcdef + ?d) as custom charset 1 and use it in the mask. workload profile -w 4 will speed things up. if you're working on the same machine, try -w 3 or -w 2 to avoid lagging. RE: Help with cracking a WPA - rln11 - 09-04-2016 So all I needed to do was move the charset to the end of the command line. So simple. Took 4 seconds to crack the hash ;-) hashcat64 -w 2 -m 2500 test.hccap -a 3 9999?d?d?d?d?d?d Thank you very much for the help. |