Alphanumeric password + signs
#3
This will do it:
Code:
I prefer this:
$ hashcat --stdout -i --increment-min=6 -a 3 -1 ?l?u?d?s ?1?1?1?1?1?1?1?1?1?1?1?1
because it is better to modify, e.g. if you need other sets of characters (-1 ?l?u), without typing the entire mask again
which is the same as:
$ hashcat --stdout -i --increment-min=6 -a 3 ?a?a?a?a?a?a?a?a?a?a?a?a

Information how to use masks is here:
https://hashcat.net/wiki/doku.php?id=mask_attack

But it doesn't make sense to do this on WPA
Code:
$ hashcat -m 22000 hashfile.hc22000 -i --increment-mi=6 -a 3 -1 ?l?u?d?s ?1?1?1?1?1?1?1?1?1?1?1?1
because:

The minimum length of a WPA-PSK (according to 802.11 specification) is 8 characters:
https://www.skillset.com/questions/what-...characters
All PSKs below 8 characters are rejected by hashcat if you try it on hashmode 22000

The calculated key space is really big and PBKDF2 (used to calculate the PMK) is a very slow algo.
If you don't have much GPU power (e.g. several machines, running 8 x RTX3090), it will take a while to recover the PSK.
https://en.wikipedia.org/wiki/Pbkdf2
Reply


Messages In This Thread
Alphanumeric password + signs - by LasPer - 09-27-2021, 02:33 AM
RE: Alphanumeric password + signs - by ZerBea - 09-27-2021, 09:32 AM
RE: Alphanumeric password + signs - by LasPer - 09-30-2021, 01:23 AM