Posts: 31
	Threads: 7
	Joined: Apr 2018
	
	
 
	
	
		I'm cracking wpa/wpa2 with hashcat 4.1.0. Workload profile -w 4 was included. Always hashcat froze desktop after 10-15 hours of cracking. Hashcat freeze PC at "mjklpr42"password. Does exist any way to continue cracking from that password to "zzzzzz99" without wordlist?
	
	
	
	
	
 
 
	
	
	
		
	Posts: 14
	Threads: 0
	Joined: Mar 2018
	
	
 
	
	
		Use --restore option to resume attack from last restore point. If you didn't specify a session name with your attack, it will be named hashcat
hashcat --restore or hashcat --session sessionname --restore
	
	
	
	
	
 
 
	
	
	
		
	Posts: 31
	Threads: 7
	Joined: Apr 2018
	
	
 
	
	
		Thanks God, I'll try it. I found out one more way. We can apply -s or --skip option -s mjklpr42, too.
	
	
	
	
	
 
 
	
	
	
		
	Posts: 2,301
	Threads: 11
	Joined: Jul 2010
	
	
 
	
		
		
		05-15-2018, 01:32 PM 
(This post was last modified: 05-15-2018, 01:32 PM by undeath.)
		
	 
	
		 (05-15-2018, 01:11 PM)camer333 Wrote:  We can apply -s or --skip option -s mjklpr42, too.
no. --skip does not accept candidates
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 31
	Threads: 7
	Joined: Apr 2018
	
	
 
	
		
		
		05-15-2018, 01:59 PM 
(This post was last modified: 05-15-2018, 06:35 PM by camer333.)
		
	 
	
		Not accept in single hashcat, but accepts candidates in merge with maskprocessor. In maskprocessor -s means start word something like a skip...