hashcat Forum
WPA2 Cracking With Password Less Then 8 Length Using rule Attack - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: WPA2 Cracking With Password Less Then 8 Length Using rule Attack (/thread-6475.html)



WPA2 Cracking With Password Less Then 8 Length Using rule Attack - xxoraxx - 04-09-2017

Hi all
i want to crack a wpa2 password with word-list + rules, but the word-list contain Password Less Then 8 Length
when i start the attack the attack fail because the password is less then 8 length
the idea of having a word-list containing password less the 8 length because some of the passwords these days are like this

{ bmwm32016, baby2017, baby123456, google123)

i want to create a word list containing password less then 8 length

bmwm3
baby
google

and the rule.rule add for me the renaming password length


$?d $d? $d? $d?

the result will become like this

bmw31234
baby1234
google1234

is there a way to make hashcat expect wordlist contain password less then 8 length


RE: WPA2 Cracking With Password Less Then 8 Length Using rule Attack - philsmd - 04-10-2017

It seems that you also opened a hashcat github issue (https://github.com/hashcat/hashcat/issues/1222#issuecomment-292860873) and it was answered and closed.

Please do not hesitate to use the forum search function next time.

Thread closed



btw: just to make sure that there aren't any new users that believe that "$?d $d? $d? $d?" is really a valid rule: You are mixing up rule syntax with mask syntax, this is not valid at all (and furthermore you use "?d" and "d?", which is also wrong). You either have to generate a set of rules, or use something like -a 6 dict.txt ?d?d?d?d ("$?d" does NOT append all digits, you need to use $0, $1, $2, $3, ..., $9 instead).