No duplicated characters when cracking wpa2 password - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: General Talk (https://hashcat.net/forum/forum-33.html) +--- Thread: No duplicated characters when cracking wpa2 password (/thread-7841.html) |
No duplicated characters when cracking wpa2 password - Trymybest - 09-28-2018 Hello, i have search across the forum but i don't find a precise answer on that question. ( i appologize in advance for my bad english) I try to crack an hccpax file with hashcat but it seems i need to use maskprocessor because the options i want to use are not available with hashcat single. More precisely, the password to crack is exactly 8 characters long, only uppercase and letters and shouldn't contain more that 2 same letters consecutively. Futhermore, it shouldn't contain more that 4 times the same letter in the word. Just like this one: https://hashcat.net/forum/thread-7836.html?highlight=duplicated So i have seen that there were two interessings commands with mp: -q 2 -r 4 But i don't know how to associate them with hashcat. I am on windows 10 and i tried to use Code: cd C:\Users\Me\Downloads\maskprocessor-0.73\maskprocessor-0.73 But nothing appear when i enter this command. Maybe i should use a mask file with hashcat ? But if i understood correctly there aren't the "-q" and "-r" options with hashcat only ?! So i have to use mp but i am not even capable to enter a correct command :/ So if anyone here would have the kindness to help me a little or even give me the correct command i would be very gratefull RE: No duplicated characters when cracking wpa2 password - atom - 09-29-2018 It's a known bug: https://github.com/hashcat/hashcat/issues/1705 As a workaround you can either switch to linux or use an older hashcat version. RE: No duplicated characters when cracking wpa2 password - philsmd - 09-29-2018 you also can't really pipe like this: command1 | cd && command2 you need to do it like this: command1 | command2 therefore something like this: Code: cd C:\Users\Alexandre\Downloads\hashcat-4.2.1\ RE: No duplicated characters when cracking wpa2 password - Trymybest - 09-29-2018 (09-29-2018, 09:24 AM)atom Wrote: It's a known bug: https://github.com/hashcat/hashcat/issues/1705 I tried the first time on The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) linux but there was a problem with the driver of my graphic Card and hashcat. I saw it was an known bug too. So i switched to Windows... Do you know wich one older version is good to use ? (09-29-2018, 11:50 AM)philsmd Wrote: you also can't really pipe like this: Thank you, i have tried this command and it seems to be correct but it stop immediately and i got this message : Code: C:\Users\Alexandre>C:\Users\Alexandre\Downloads\maskprocessor-0.73\maskprocessor-0.73\mp64 -q 2 -r 4 ?u?u?u?u?u?u?u?u | C:\Users\Alexandre\Downloads\hashcat-4.2.1\hashcat64 -m 2500 -a 0 handshakes\01.hccapx RE: No duplicated characters when cracking wpa2 password - robinex - 09-29-2018 go to hashcat folder and click path browser-remove all-write cmd-after try with opened cmd window. RE: No duplicated characters when cracking wpa2 password - philsmd - 09-30-2018 the command I told you to use was different: 1. enter the hashcat folder within the cmd: Code: cd C:\Users\Alexandre\Downloads\hashcat-4.2.1\ 2. afterwards run hashcat within that specific folder: Code: C:\Users\Alexandre\Downloads\maskprocessor-0.73\maskprocessor-0.73\mp64 -q 2 -r 4 ?u?u?u?u?u?u?u?u | hashcat64.exe -m 2500 -a 0 handshakes\01.hccapx I'm not sure why you even think about changing the commands like you do. You need to do it correctly as I mentioned, changing the folders won't work because the files clearly are not within the C:\Users\Alexandre folder but within the hashcat folder ( C:\Users\Alexandre\Downloads\hashcat-4.2.1\ ) instead. Therefore, you need to enter that folder RE: No duplicated characters when cracking wpa2 password - Trymybest - 09-30-2018 (09-30-2018, 10:46 AM)philsmd Wrote: the command I told you to use was different: Hello, I'm sorry for this mistake. I modify my command and now it seems to perfectly work, thank you very much ! What i got is this Code: C:\Users\Alexandre\Downloads\hashcat-4.2.1>C:\Users\Alexandre\Downloads\maskprocessor-0.73\maskprocessor-0.73\mp64 -q 2 -r 4 ?u?u?u?u?u?u?u?u | hashcat64.exe -m 2500 -a 0 handshaketest.hccapx And i got plenty others like this one : Code: Session..........: hashcat Do you have any idea if everything is right ? I have not any problem at all to wait several days with the script running but I just want to be sure that i will not do all of this for nothing It's the first time i use it so i 'm a little scared because i don't see any progress bar ending. But i suppose it will be relatively quick ! Because every characters are uppercase and there is no number or special characters... And again, thank you for your time and your kindness. I'm very gratefull to you RE: No duplicated characters when cracking wpa2 password - undeath - 10-01-2018 When piping in candidates hashcat cannot show you any progress. It is working however. You can verify this by seeing the "progress" counter increasing: Progress.........: 2949120 You can speed up hashcat a bit by appending -O to its command line. |