08-20-2016, 11:36 AM
(This post was last modified: 08-20-2016, 11:38 AM by freeroute.
Edit Reason: Mispell.
)
Thanks for you help.
I guess hashcat rejected password that shorter than 8 characters. I know that WPA2 algorithm has password limitations. It should be min 8. char. and max. 64 char.
But in this case I use hybrid attack. I have worldlist and T0+append 4 digits.
In my wordlist there are some words that shorten that 8 chars. ( e.g. password "adrie" rejected. "adrie" + T0+append 4 digits= Adrie1984, which is 9 chars.)
My command was: hashcat -D 1 --force -m 2500 -a 0 5050_1471634242.hccap /usr/share/wordlists/Surnames.dic -r /usr/share/hashcat/rules/toggle_first_and_append_digits.rule
And the status was:
Session.Name...: hashcat
Status.........: Aborted
Rules.Type.....: File (/usr/share/hashcat/rules/toggle_first_and_append_digits.rule)
Input.Mode.....: File (/usr/share/wordlists/Surnames.dic)
Hash.Target....: xxxxxxx (c4:6e:1f:3f:5f:c8 <-> 00:23:4d:1d:ea:82)
Hash.Type......: WPA/WPA2
Time.Started...: Sat Aug 20 11:28:46 2016 (1 sec)
Time.Estimated.: Mon Aug 22 21:32:02 2016 (2 days, 10 hours)
Speed.Dev.#2...: 840 H/s (12.85ms)
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 138184/175733200 (0.08%)
Rejected.......: 137000/138184 (99.14%)
Restore.Point..: 0/1757332 (0.00%)
Started: Sat Aug 20 11:28:46 2016
Stopped: Sat Aug 20 11:28:50 2016
Why did reject hashcat passwords that are shorter than 8 chars in this case?
Thanks.
I guess hashcat rejected password that shorter than 8 characters. I know that WPA2 algorithm has password limitations. It should be min 8. char. and max. 64 char.
But in this case I use hybrid attack. I have worldlist and T0+append 4 digits.
In my wordlist there are some words that shorten that 8 chars. ( e.g. password "adrie" rejected. "adrie" + T0+append 4 digits= Adrie1984, which is 9 chars.)
My command was: hashcat -D 1 --force -m 2500 -a 0 5050_1471634242.hccap /usr/share/wordlists/Surnames.dic -r /usr/share/hashcat/rules/toggle_first_and_append_digits.rule
And the status was:
Session.Name...: hashcat
Status.........: Aborted
Rules.Type.....: File (/usr/share/hashcat/rules/toggle_first_and_append_digits.rule)
Input.Mode.....: File (/usr/share/wordlists/Surnames.dic)
Hash.Target....: xxxxxxx (c4:6e:1f:3f:5f:c8 <-> 00:23:4d:1d:ea:82)
Hash.Type......: WPA/WPA2
Time.Started...: Sat Aug 20 11:28:46 2016 (1 sec)
Time.Estimated.: Mon Aug 22 21:32:02 2016 (2 days, 10 hours)
Speed.Dev.#2...: 840 H/s (12.85ms)
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 138184/175733200 (0.08%)
Rejected.......: 137000/138184 (99.14%)
Restore.Point..: 0/1757332 (0.00%)
Started: Sat Aug 20 11:28:46 2016
Stopped: Sat Aug 20 11:28:50 2016
Why did reject hashcat passwords that are shorter than 8 chars in this case?
Thanks.