![]() |
Help using oclhashcat .hccap file - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Help using oclhashcat .hccap file (/thread-6422.html) |
Help using oclhashcat .hccap file - billyjoee007 - 03-23-2017 Hi all I am new to this but managed to grab a handshake from a WPA2, WPS router. .cap file converted now to a .hccap file. I know the password is 16 digits long with both capital letters and numbers. I'm not sure how to write the command for this. Currently using The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) linux and read oclhashcat would be faster since it uses my GPU. Can this be done in The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) linux (VMware) or should I run straight from my PC? What would the command be? Sorry for asking I'm sure, a stupid question. Thank you all for the help! Cheers! RE: Help using oclhashcat .hccap file - billyjoee007 - 03-23-2017 oclhashcat is no longer being used? hmm. RE: Help using oclhashcat .hccap file - billyjoee007 - 03-23-2017 right now atm I am using crunch 16 16 ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890 | aircrack-ng /root/capfile.cap -b 00-00-00-00-00-00 -w- Looks like it may take months. Can hashcat do better? Thanks! RE: Help using oclhashcat .hccap file - philsmd - 03-23-2017 1. use hashcat 3.40 (or higher, beta: https://hashcat.net/beta/) 2. use hccapx files (convert your caps with cap2hccapx from hashcat-utils or the converter: https://hashcat.net/cap2hccapx/ 3. use some more intelligent attack, not brute-force, maybe dict attack? (mask attack would be like hashcat -w 4 -m 2500 -a 3 -1 ?u?d hccapxfile.hccapx ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1 , but the keyspace is not feasible!) 4. understand that length 16 is very, very, very long! Too long for brute-force! And it wouldn't just "take months", it would take thousands of years even if you would have the best and largest amount of hardware |