hashcat Forum
Decrypting WPA-EAPOL-PBKDF2 quiestion ? - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Decrypting WPA-EAPOL-PBKDF2 quiestion ? (/thread-9696.html)



Decrypting WPA-EAPOL-PBKDF2 quiestion ? - kira_ghost - 12-08-2020

hi ,,,
i am using -m 2500 attack trying to decrypt WPA , i already tried all possible numbers 8 long using mask
"?d?d?d?d?d?d?d?d"
now i need to make hashcat trying 8 password long of lower,upper letter and number combination , but i don't want it to waste time trying combination of numbers only since i already tried them , how can i force hashcat doing so ?


RE: Decrypting WPA-EAPOL-PBKDF2 quiestion ? - undeath - 12-09-2020

you need to run multiple masks, each one with a position that does not include a digit

hcmask example:
?l?u?d,?l?u,?2?1?1?1?1?1?1?1
?l?u?d,?l?u,?1?2?1?1?1?1?1?1

?l?u?d,?l?u,?1?1?1?1?1?1?1?2

but this attack is going to take a long time.


RE: Decrypting WPA-EAPOL-PBKDF2 quiestion ? - kira_ghost - 12-25-2020

(12-09-2020, 01:46 PM)undeath Wrote: you need to run multiple masks, each one with a position that does not include a digit

hcmask example:
?l?u?d,?l?u,?2?1?1?1?1?1?1?1
?l?u?d,?l?u,?1?2?1?1?1?1?1?1

?l?u?d,?l?u,?1?1?1?1?1?1?1?2

but this attack is going to take a long time.

thanks a lot , yeah a lot of time ,i just thought that there is a way to prevent hashcat from using numbers only in the attack .