bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order (/thread-7970.html) |
bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - Shivraj Singh - 11-22-2018 Hi guys, I need help cracking WPA2 . I suppose password is a Mobile Number with range from 9999999999 to 6000000000 (better to use decreasing order) or any 8 digit number or any 9 digit number Kindly give the Hashcat64.exe command to implement above rules RE: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - undeath - 11-22-2018 https://hashcat.net/wiki/doku.php?id=mask_attack RE: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - Shivraj Singh - 11-22-2018 (11-22-2018, 11:53 AM)undeath Wrote: https://hashcat.net/wiki/doku.php?id=mask_attack I have created file mobile.hcmask contents is as under 9?d?d?d?d?d?d?d?d?d 8?d?d?d?d?d?d?d?d?d 7?d?d?d?d?d?d?d?d?d 6?d?d?d?d?d?d?d?d?d ?d?d?d?d?d?d?d?d ?d?d?d?d?d?d?d?d?d Please suggest Hashcat command RE: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - DanielG - 11-22-2018 Try to find resources like https://hashcat.net/wiki/doku.php?id=hashcat and https://resources.infosecinstitute.com/hashcat-tutorial-beginners/ where you can learn how to use various types of software. RE: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - royce - 11-22-2018 The question of how to create a specific Markov of digits in inverse order is a tricky one that is not easy to do with hashcat itself. Naively, I tried this, but it obviously didn't work: Code: $ cat invert-integers.list I got closer with a file with more of each character per line: Code: $ tail invert-integers-byline.list For obvious reasons, doing this with Markov wouldn't really make sense. It was fun to try, though. The idea of "inverted Markov" is one that I've brought up before, but there are no in-hashcat methods for doing this. Instead, you would have to generate candidates externally, using a custom script. RE: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - atom - 11-23-2018 How about --markov-disable ? In that case, if you use -1, the ordering of the configuration you set remains. RE: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - royce - 11-23-2018 Hmm ... Code: $ hashcat --stdout --markov-disable -a 3 -1 987654321 ?d RE: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order - philsmd - 11-23-2018 (you should use ?1 if you set -1 ) |