Help to BruteForce WPA
#7
(02-23-2014, 05:27 PM)Milzo Wrote: You'll need to add parameter --status / --status-timer=N to your command for minimal details.

You do know that piping crunch or mask processor to hashcat greatly! reduces your speed right?

Just use hashcat on it's own with the mask ?u?u?u?u?u?u?u?u

Well, you say this but hashcat on its own before achieved 120,000~ hash/sec this now is running at 158,000~ hash/sec.

I was using this mask before - but what about ensuring no two letters are duplicated next to eachother?

Thanks for the --status pointer!


Messages In This Thread
Help to BruteForce WPA - by Walkman950 - 02-23-2014, 01:07 PM
RE: Help to BruteForce WPA - by philsmd - 02-23-2014, 01:27 PM
RE: Help to BruteForce WPA - by Walkman950 - 02-23-2014, 04:59 PM
RE: Help to BruteForce WPA - by Walkman950 - 02-23-2014, 05:16 PM
RE: Help to BruteForce WPA - by philsmd - 02-23-2014, 05:26 PM
RE: Help to BruteForce WPA - by Milzo - 02-23-2014, 05:27 PM
RE: Help to BruteForce WPA - by Walkman950 - 02-23-2014, 05:55 PM
RE: Help to BruteForce WPA - by Milzo - 02-23-2014, 06:18 PM
RE: Help to BruteForce WPA - by Walkman950 - 02-23-2014, 06:30 PM