Help to BruteForce WPA
#2
The up-to-date version of maskprocessor can always be downloaded from: https://hashcat.net/wiki/doku.php?id=maskprocessor
You can use this as mp64.exe -q 2 ?u?u?u?u?u?u?u?u to:
1. create a dict (might use a lot of disk)
2. pipe it to oclHashcat (no disk usage at all, stdin mode)

Also always do a benchmark b4 running a specific hash mode, e.g.
oclHashcat -m 2500 -b

and see how fast it is, then use the -u and -n values in your command line.

I know that the mask attack in oclHashcat currently has no -q option, but anyway if you didn't read it yet, this wiki page http://hashcat.net/wiki/doku.php?id=mask_attack is very helpful to understand the basics about masks (also to understand them better how to use masks w/ maskprocessor etc).

Hope this helps


Messages In This Thread
Help to BruteForce WPA - by Walkman950 - 02-23-2014, 01:07 PM
RE: Help to BruteForce WPA - by philsmd - 02-23-2014, 01:27 PM
RE: Help to BruteForce WPA - by Walkman950 - 02-23-2014, 04:59 PM
RE: Help to BruteForce WPA - by Walkman950 - 02-23-2014, 05:16 PM
RE: Help to BruteForce WPA - by philsmd - 02-23-2014, 05:26 PM
RE: Help to BruteForce WPA - by Milzo - 02-23-2014, 05:27 PM
RE: Help to BruteForce WPA - by Walkman950 - 02-23-2014, 05:55 PM
RE: Help to BruteForce WPA - by Milzo - 02-23-2014, 06:18 PM
RE: Help to BruteForce WPA - by Walkman950 - 02-23-2014, 06:30 PM