08-21-2012, 08:17 PM
It should, yeah. I dont know the command for jtr incremental but this should inspire you:
./john --stdout | ./oclHashcat-plus -m 2500 ...
./john --stdout | ./oclHashcat-plus -m 2500 ...
piping incremental JtR into hashcat to crack WPA2
|
« Next Oldest | Next Newest »
|
Messages In This Thread |
piping incremental JtR into hashcat to crack WPA2 - by Night_Reaper - 08-21-2012, 08:13 PM
RE: piping incremental JtR into hashcat to crack WPA2 - by atom - 08-21-2012, 08:17 PM
RE: piping incremental JtR into hashcat to crack WPA2 - by tony - 08-22-2012, 12:39 AM
RE: piping incremental JtR into hashcat to crack WPA2 - by me.scotty - 08-22-2012, 01:09 AM
RE: piping incremental JtR into hashcat to crack WPA2 - by atom - 08-22-2012, 09:53 AM
|