oclHashcat exhausted immediatly when using long mask on WPA brute-force attack
#2
I forgot to mention that oclHashcat has no problem when running a dictionary attack using a dictionary made of 26 characters keys following the same format.

Code:
oclHashcat64.bin -m 2500 10_clean.hccap dictionaries/Liveb0x_WPA_hexa.txt


Messages In This Thread
RE: oclHashcat exhausted immediatly when using long mask on WPA brute-force attack - by 0xd - 11-25-2014, 07:54 PM