05-31-2012, 11:58 PM
I couldn't see this in the wiki so I assume it is not possible but I thought I would ask anyway, as I always seem to be the last to know about new things !!
With maskprocessor I can add these instructions...
--start-at= --stop-at=
This is useful if I want to brute force WPA. Some 8 character upper only passwords are brute-forcable now. I can do a character in 24 hours so the whole lot can be done in 26 days. It is useful to be able to break these down to smaller amounts rather than 24 hour periods. I have made it so maskprocessor breaks it down into 12 hours parts.
I know I can pipe maskprocessor to hashcat-plus to get the desired effect but it would be much neater to be able to do this with just hashcat-plus commands.
Also I guess I would retain the estimated time to completion if this was possible. At the moment when piping from maskprocessor I loose that.
Actually if we cannot do this directly in hashcat-plus, can you please take this as a feature request ?
Thank you.
With maskprocessor I can add these instructions...
--start-at= --stop-at=
This is useful if I want to brute force WPA. Some 8 character upper only passwords are brute-forcable now. I can do a character in 24 hours so the whole lot can be done in 26 days. It is useful to be able to break these down to smaller amounts rather than 24 hour periods. I have made it so maskprocessor breaks it down into 12 hours parts.
I know I can pipe maskprocessor to hashcat-plus to get the desired effect but it would be much neater to be able to do this with just hashcat-plus commands.
Also I guess I would retain the estimated time to completion if this was possible. At the moment when piping from maskprocessor I loose that.
Actually if we cannot do this directly in hashcat-plus, can you please take this as a feature request ?
Thank you.