![]() |
bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order (/thread-7970.html) |
bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - Shivraj Singh - 11-22-2018 Hi guys, I need help cracking WPA2 . I suppose password is a Mobile Number with range from 9999999999 to 6000000000 (better to use decreasing order) or any 8 digit number or any 9 digit number Kindly give the Hashcat64.exe command to implement above rules RE: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - undeath - 11-22-2018 https://hashcat.net/wiki/doku.php?id=mask_attack RE: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - Shivraj Singh - 11-22-2018 (11-22-2018, 11:53 AM)undeath Wrote: https://hashcat.net/wiki/doku.php?id=mask_attack I have created file mobile.hcmask contents is as under 9?d?d?d?d?d?d?d?d?d 8?d?d?d?d?d?d?d?d?d 7?d?d?d?d?d?d?d?d?d 6?d?d?d?d?d?d?d?d?d ?d?d?d?d?d?d?d?d ?d?d?d?d?d?d?d?d?d Please suggest Hashcat command RE: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - DanielG - 11-22-2018 Try to find resources like https://hashcat.net/wiki/doku.php?id=hashcat and https://resources.infosecinstitute.com/hashcat-tutorial-beginners/ where you can learn how to use various types of software. RE: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - royce - 11-22-2018 The question of how to create a specific Markov of digits in inverse order is a tricky one that is not easy to do with hashcat itself. Naively, I tried this, but it obviously didn't work: Code: $ cat invert-integers.list I got closer with a file with more of each character per line: Code: $ tail invert-integers-byline.list For obvious reasons, doing this with Markov wouldn't really make sense. It was fun to try, though. ![]() The idea of "inverted Markov" is one that I've brought up before, but there are no in-hashcat methods for doing this. Instead, you would have to generate candidates externally, using a custom script. RE: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - atom - 11-23-2018 How about --markov-disable ? In that case, if you use -1, the ordering of the configuration you set remains. RE: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - royce - 11-23-2018 Hmm ... Code: $ hashcat --stdout --markov-disable -a 3 -1 987654321 ?d RE: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - philsmd - 11-23-2018 (you should use ?1 if you set -1 ) |