Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Question about hccapx file
Post: RE: Question about hccapx file
royce Wrote: (06-04-2018, 03:40 AM)
--
I *think* you can do something along those lines with hcxtools?
https://github.com/ZerBea/hcxtools
--
I actually tried that tool in a The-Distribution-Whi... |
|
veggiebiker2500 |
General Talk
|
6 |
16,982 |
06-04-2018, 08:44 PM |
|
|
Thread: Question about hccapx file
Post: RE: Question about hccapx file
RealEnder Wrote: (06-04-2018, 07:14 AM)
--
You can remove some handshakes with hcxtools or with any other tool, that can work with binary data, but how do you know what handshakes to remove? If there... |
|
veggiebiker2500 |
General Talk
|
6 |
16,982 |
06-04-2018, 08:40 PM |
|
|
Thread: Question about hccapx file
Post: Question about hccapx file
For example,
Lets say I have a hccapx file with 5 handshakes from the same network (ssid/salt) and I have a wordlist that contains the correct WPA passcode....
Would hashcat crack the password faster... |
|
veggiebiker2500 |
General Talk
|
6 |
16,982 |
06-01-2018, 06:32 PM |
|
|
Thread: NetgearKiller.dict - my Netgear WPA dict
Post: RE: NetgearKiller.dict - my Netgear WPA dict
Hi! I randomly stumbled upon this post and noticed something funny....The default password for Spectrum routers here in the US are the exact same format....The SSID is MySpectrumWiFiXX-2G and the pass... |
|
veggiebiker2500 |
User Contributions
|
15 |
157,274 |
04-26-2018, 04:45 AM |
|
|
Thread: Rule for omitting duplicates in bruteforce attack?
Post: RE: Rule for omitting duplicates in bruteforce att...
royce Wrote: (04-23-2018, 04:35 PM)
--
Generally speaking, there's no efficient way to eliminate duplicates within hashcat itself. You'd have to write an external candidate-password generator, and pi... |
|
veggiebiker2500 |
hashcat
|
6 |
17,424 |
04-23-2018, 05:05 PM |
|
|
Thread: Rule for omitting duplicates in bruteforce attack?
Post: RE: Rule for omitting duplicates in bruteforce att...
Yeah, I was just using a general example and didn't realize that a 12 char passcode would take years even on a gaming PC. But lets assume it's only a 6 char password...
hashcat64.exe -m 2500 -a 3 ca... |
|
veggiebiker2500 |
hashcat
|
6 |
17,424 |
04-23-2018, 03:18 PM |
|
|
Thread: Rule for omitting duplicates in bruteforce attack?
Post: Rule for omitting duplicates in bruteforce attack?
Hi, I'm trying to crack a handshake using a bruteforce attack....I know the password has 12 characters uppercase+numbers, which is a lot of permutations, but I also know that all the characters in the... |
|
veggiebiker2500 |
hashcat
|
6 |
17,424 |
04-22-2018, 07:28 PM |
|
|
Thread: appending numbers to combo attack
Post: RE: appending numbers to combo attack
Huge thanks to both Undeath and Philsmd! I'm still pretty new to hashcat so I had a hard time changing the syntax from Undeath's code to work in Windows, but Philsmd's technique worked perfectly for m... |
|
veggiebiker2500 |
hashcat
|
3 |
22,413 |
04-15-2018, 08:01 AM |
|
|
Thread: appending numbers to combo attack
Post: appending numbers to combo attack
Hi! I want to crack a password in the format of word1+word2 +3 digit number.
I got hashcat up and running on my gaming PC and got it to do a combination attack with the 2 word lists using this code... |
|
veggiebiker2500 |
hashcat
|
3 |
22,413 |
04-14-2018, 02:02 PM |