found similar page but with pyrit http://ob-security.info/?p=18,
with debug mode =3, it reports debug mode >2, but still have problem to get it find my password.
./hashcat-cli64.bin -m 200 -r rules/best10.rule --debug-mode=3 nofind.hash dictionary.dic | pyrit -r tiny*.cap -i - -b 00:xx:44:B9:xx:xx --all-handshakes attack_passthrough
seem not to do anything.
best10.rule is :
:
l
c
u
t
$0
$1
$2
$3
$4
I add password in dictionary.dic. But it says no password found!!!!
./hashcat-cli64.bin -m 200 -r rules/best10.rule --debug-mode=3 nofind.hash dictionary.dic > out.txt
out.txt is empty all the time! I don't understand why
with
Sorry to use pyrit and ask my question here.
I have to used pyrit because if this does work than I will replace the second part with ohc+, as I already used
./mp64.bin -1 ?l?d pypk?1?1?1?1 | ./ohcplus64.bin ....
with debug mode =3, it reports debug mode >2, but still have problem to get it find my password.
./hashcat-cli64.bin -m 200 -r rules/best10.rule --debug-mode=3 nofind.hash dictionary.dic | pyrit -r tiny*.cap -i - -b 00:xx:44:B9:xx:xx --all-handshakes attack_passthrough
seem not to do anything.
best10.rule is :
:
l
c
u
t
$0
$1
$2
$3
$4
I add password in dictionary.dic. But it says no password found!!!!
./hashcat-cli64.bin -m 200 -r rules/best10.rule --debug-mode=3 nofind.hash dictionary.dic > out.txt
out.txt is empty all the time! I don't understand why
with
Sorry to use pyrit and ask my question here.
I have to used pyrit because if this does work than I will replace the second part with ohc+, as I already used
./mp64.bin -1 ?l?d pypk?1?1?1?1 | ./ohcplus64.bin ....