hashcat Forum
Noob question, bruteforce pmkid/wpa2 ISP default passwords - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Noob question, bruteforce pmkid/wpa2 ISP default passwords (/thread-8652.html)



Noob question, bruteforce pmkid/wpa2 ISP default passwords - shroomalot - 09-20-2019

hello,

I am trying to crack a wpa2/pmkid hash, using a mask or ruleset

the hash I am trying to brute has the following properties
  • exactly 12 characters long
  • only uppercase
  • numbers 0-9
my questions are is rule/mask based even the way to approach this?
or should i be using something else

Thanks in advance,

Shroom


RE: Noob question, bruteforce pmkid/wpa2 ISP default passwords - undeath - 09-20-2019

without further knowledge that's hardly feasible. You might be interested in this thread: https://hashcat.net/forum/thread-6170.html

Other than that, here's the documentation for mask attacks: https://hashcat.net/wiki/doku.php?id=mask_attack