06-05-2018, 04:01 PM
(06-05-2018, 04:36 AM)starkkh Wrote: Hi everybody ,
Anytime I want to run a brute force attack with masks or a rule based attack I have really really long estimated time now I just tried another time a brute force attacks with masks and the estimated time is 40.000 years !!!
I use a Macbook Air for the moment but i'll buy a PC laptop with linux soon .
Here is the command I used :
./hashcat -m 2500 -a 3 -1 ?l -2 ?l?u?d?s -3 ?d hash file ?2?2?2?2?2?2?2
Can you please tell me how to fix this ?
Two other things for you, using a Mac or Linux will be very (relatively slow) if you don't have graphics cards. If you want to speed things up, use graphics cards.
Also, I'm wondering where you got that mask, or why you're using it that way? You have three custom character sets but in your brute force, you're only using one. And the one you're using is the same as using ?a, no? Like Royce suggested, have you already tried using wordlists with rules? There's a lot of good ones out there and if it's WPA, it's likely to be not random, likely to be words since people need to remember that kind of password. Good luck!