05-11-2020, 04:03 PM
(05-11-2020, 03:53 PM)philsmd Wrote: The executable is definitely within the maskprocessor folder: https://github.com/hashcat/maskprocessor/releases
Well, it would make sense to explain what attack mode you tried and how your strategy is to attack the hashes.
Maybe consider rule-based dictionary attack etc ?
brute-forcing might not be the most clever idea for slow hashes like WPA2
Thank you for that much appriciated!
I thought about the dictionary attack but it's not guarnteed to find the password, expecially if it's a password that is completely random.
If you was deturmined to get in would you use a dictionary attack and then brute force if that fails?