04-22-2018, 07:28 PM
Hi, I'm trying to crack a handshake using a bruteforce attack....I know the password has 12 characters uppercase+numbers, which is a lot of permutations, but I also know that all the characters in the password are unique, so I don't want hashcat wasting it's energy going through passwords with duplicate chars. Is there a rule or function I can use? I didn't find any in the wiki
Here's my code so far...
hashcat64.exe -m 2500 -a 3 capture.hccapx -1 ?u?d ?1?1?1?1?1?1?1?1?1?1?1?1
I appreciate any help!
Here's my code so far...
hashcat64.exe -m 2500 -a 3 capture.hccapx -1 ?u?d ?1?1?1?1?1?1?1?1?1?1?1?1
I appreciate any help!