02-18-2015, 07:02 PM
If we have a WPA2 handshake, and wanted to brute force it with -1 ?l?u?d for starters, but we dont know the length of the password, would this be a good start?
oclhashcat.exe -m 2500 -a 3 <capture.hccap> -1 ?l?u?d --incremental
oclhashcat.exe -m 2500 -a 3 <capture.hccap> -1 ?l?u?d --incremental