WPA2 Cracking With Password Less Then 8 Length Using rule Attack - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: WPA2 Cracking With Password Less Then 8 Length Using rule Attack (/thread-6475.html) |
WPA2 Cracking With Password Less Then 8 Length Using rule Attack - xxoraxx - 04-09-2017 Hi all i want to crack a wpa2 password with word-list + rules, but the word-list contain Password Less Then 8 Length when i start the attack the attack fail because the password is less then 8 length the idea of having a word-list containing password less the 8 length because some of the passwords these days are like this { bmwm32016, baby2017, baby123456, google123) i want to create a word list containing password less then 8 length bmwm3 baby and the rule.rule add for me the renaming password length $?d $d? $d? $d? the result will become like this bmw31234 baby1234 google1234 is there a way to make hashcat expect wordlist contain password less then 8 length RE: WPA2 Cracking With Password Less Then 8 Length Using rule Attack - philsmd - 04-10-2017 It seems that you also opened a hashcat github issue (https://github.com/hashcat/hashcat/issues/1222#issuecomment-292860873) and it was answered and closed. Please do not hesitate to use the forum search function next time. Thread closed btw: just to make sure that there aren't any new users that believe that "$?d $d? $d? $d?" is really a valid rule: You are mixing up rule syntax with mask syntax, this is not valid at all (and furthermore you use "?d" and "d?", which is also wrong). You either have to generate a set of rules, or use something like -a 6 dict.txt ?d?d?d?d ("$?d" does NOT append all digits, you need to use $0, $1, $2, $3, ..., $9 instead). |