Decrypting WPA-EAPOL-PBKDF2 quiestion ? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Decrypting WPA-EAPOL-PBKDF2 quiestion ? (/thread-9696.html) |
Decrypting WPA-EAPOL-PBKDF2 quiestion ? - kira_ghost - 12-08-2020 hi ,,, i am using -m 2500 attack trying to decrypt WPA , i already tried all possible numbers 8 long using mask "?d?d?d?d?d?d?d?d" now i need to make hashcat trying 8 password long of lower,upper letter and number combination , but i don't want it to waste time trying combination of numbers only since i already tried them , how can i force hashcat doing so ? RE: Decrypting WPA-EAPOL-PBKDF2 quiestion ? - undeath - 12-09-2020 you need to run multiple masks, each one with a position that does not include a digit hcmask example: ?l?u?d,?l?u,?2?1?1?1?1?1?1?1 ?l?u?d,?l?u,?1?2?1?1?1?1?1?1 … ?l?u?d,?l?u,?1?1?1?1?1?1?1?2 but this attack is going to take a long time. RE: Decrypting WPA-EAPOL-PBKDF2 quiestion ? - kira_ghost - 12-25-2020 (12-09-2020, 01:46 PM)undeath Wrote: you need to run multiple masks, each one with a position that does not include a digit thanks a lot , yeah a lot of time ,i just thought that there is a way to prevent hashcat from using numbers only in the attack . |