The executable is definitely within the maskprocessor folder: https://github.com/hashcat/maskprocessor/releases
Well, it would make sense to explain what attack mode you tried and how your strategy is to attack the hashes.
Maybe consider rule-based dictionary attack etc ?
brute-forcing might not be the most clever idea for slow hashes like WPA2
Well, it would make sense to explain what attack mode you tried and how your strategy is to attack the hashes.
Maybe consider rule-based dictionary attack etc ?
brute-forcing might not be the most clever idea for slow hashes like WPA2