Posts: 22
Threads: 8
Joined: Apr 2018
02-21-2019, 04:26 AM
(This post was last modified: 02-21-2019, 04:28 AM by mysterdee.)
Could somebody please explain to me how to generate a 8 digit mask using
UPPER A-F 0-9 (8 digits) MASk
i have currently tried -m 2500 -a 3 -1 ?u?d ?1?1?1?1?1?1?1?1 and got a 2yr time
im hoping to shorten this with a correct mask that uses 8 characters instead of itterating throu 1 character to 8 in increments
Anybody help me.
8 digit mask A-F 0-9 for wpa password i.e (AF12FE55)
thanks in advance
Posts: 407
Threads: 2
Joined: Dec 2015
hashcat -m 2500 -a 3 -1 ABCDEF?d ?1?1?1?1?1?1?1?1
If it says 2 years, it means 2 years.
Posts: 22
Threads: 8
Joined: Apr 2018
(02-21-2019, 04:39 AM)Chick3nman Wrote: hashcat -m 2500 -a 3 -1 ABCDEF?d ?1?1?1?1?1?1?1?1
If it says 2 years, it means 2 years.
ok, but is that incrementic from 1character then 2 then 3 upto 8
Or just doing straight 8 characters
Thanks by the way
Posts: 22
Threads: 8
Joined: Apr 2018
(02-21-2019, 04:56 AM)mysterdee Wrote: (02-21-2019, 04:39 AM)Chick3nman Wrote: hashcat -m 2500 -a 3 -1 ABCDEF?d ?1?1?1?1?1?1?1?1
If it says 2 years, it means 2 years.
ok, but is that incrementic from 1character then 2 then 3 upto 8
Or just doing straight 8 characters
Thanks by the way
your mask reveals a 1 day wait
Posts: 407
Threads: 2
Joined: Dec 2015
02-21-2019, 07:25 AM
(This post was last modified: 02-21-2019, 07:26 AM by Chick3nman.)
Cool, then it will take 1 day
Add "--increment-min 8" to the command to make it start at 8 characters
Posts: 2,267
Threads: 16
Joined: Feb 2013
btw, as an alternative to a custom charset (-1 etc), there is also the built-in charset ?H that does the same thing. See --help:
Code:
- [ Built-in Charsets ] -
...
H | 0123456789ABCDEF
Code:
hashcat -m 2500 -a 3 ?H?H?H?H?H?H?H?H
btw: this wouldn't affect the speed/performance at all, it just doesn't require to set your own custom charset
Posts: 22
Threads: 8
Joined: Apr 2018
(02-21-2019, 07:25 AM)Chick3nman Wrote: Cool, then it will take 1 day
Add "--increment-min 8" to the command to make it start at 8 characters
Thanks but i get this error
increment min is only supported with increment switch
any ideas???
Posts: 22
Threads: 8
Joined: Apr 2018
02-25-2019, 07:08 PM
(This post was last modified: 02-25-2019, 07:10 PM by mysterdee.)
(02-25-2019, 06:47 PM)Jiminy Wrote: the correct syntax = --increment-min=8
Take a look at the help file for the correct commands syntax.
To view the help file use hashcat --help
apparently i have to add the -i before
i got now hashcat -m 2500 -i --increment-min=8 tester.hccap -a 3 -1 ABCDEF?d ?1?1?1?1?1?1?1?1
i take it this will do an 8 character mask starting ay 8 characters only
not
1
12
123
12345
123456
1234567
12345678
it will do
A83DF23A
correct...
but it stil says it will take a day n half, so no change.
that tells me that even without adding the --increment-min=8 it would still have done an 8 character mask
am i right to think this or is it doing it in increments ..
thanks.
Posts: 803
Threads: 135
Joined: Feb 2011
02-25-2019, 08:06 PM
(This post was last modified: 02-25-2019, 08:13 PM by Mem5.)
-m 2500 is WPA. WPA password cannot be less than 8 characters.
So you do NOT want to test less than 8 characters
You start at 8 up to 63 (max for WPA)
"-i --increment-min=8" is useless.
Correct syntax is:
Code:
hashcat -m 2500 -a 3 ?H?H?H?H?H?H?H?H
This will test all candidates of hexa length 8. Add another "?H" for length 9. And so on.
Depending on your GPU(s), it can take a long time..
Posts: 374
Threads: 0
Joined: Nov 2017
02-26-2019, 01:09 AM
(This post was last modified: 02-26-2019, 01:11 AM by slyexe.)
(02-25-2019, 08:06 PM)Mem5 Wrote: -m 2500 is WPA. WPA password cannot be less than 8 characters.
So you do NOT want to test less than 8 characters
You start at 8 up to 63 (max for WPA)
"-i --increment-min=8" is useless.
Correct syntax is:
Code:
hashcat -m 2500 -a 3 ?H?H?H?H?H?H?H?H
This will test all candidates of hexa length 8. Add another "?H" for length 9. And so on.
Depending on your GPU(s), it can take a long time..
Very true, any candidates less than 8 will be skipped for WPA encryption. If you are wanting to test 8+ characters, increment can still be used. Just make the mask whatever length you'd like say 12 (which would take a million years) and append increment to hashcat to start from 8 and move forward from there.
Example
Code:
hashcat64.exe -m 2500 -a 3 -w 4 -i --increment-min 8 --increment-max 10 hash.txt ?H?H?H?H?H?H?H?H?H?H?H?H
So even though we have a mask length of 12 it will only attack from 8 to 10, beginning with 8. Uppercase Hex is not a very efficient attack however. I would investigate further into the router for a more suitable attack, such as default passwords from images and if a key generator is available. Can also try pixiedust for a quick wps exploit or reaver/bully if you are in range of the AP for long enough (typically 4 hours).