- you should download hashcat directly from https://hashcat.net/hashcat/
- don't use crunch, use this instead:
where my.rule is a rule file like the ones in rules/ folder , but that doesn't shorten the passwords to < 8 characters
where dict.txt is a dictionary file that does contain very likely/good password candidates
This makes sense, because WPA/WPA2 has a minimum password length of 8 chars/bytes and brute-forcing (trying all these different characters) a password that is 10+ characters long is infeasible (not possible, even with a lot of GPUs)
If that command still doesn't work, try to see if a benchmark works:
- don't use crunch, use this instead:
Code:
hashcat -m 2500 -a 0 -w 3 -r my.rule -d 2 file.hccapx dict.txt
where my.rule is a rule file like the ones in rules/ folder , but that doesn't shorten the passwords to < 8 characters
where dict.txt is a dictionary file that does contain very likely/good password candidates
This makes sense, because WPA/WPA2 has a minimum password length of 8 chars/bytes and brute-forcing (trying all these different characters) a password that is 10+ characters long is infeasible (not possible, even with a lot of GPUs)
If that command still doesn't work, try to see if a benchmark works:
Code:
hashcat -m 2500 -b