Brute Force WPA2
#2
no

1. --incremental is not a valid oclHashcat switch, I think you mean --increment (always double-check the switches with the --help output):
-i, --increment Enable increment mode

2. with -a 3 you always need to also supply a mask, so there are at least 2 different kinds of information needed:
- the custom char set(s) ( see https://hashcat.net/wiki/doku.php?id=mas...m_charsets )
- where this/these char set(s) should be used in the mask

e.g. something like -a 3 -1 ?l?u?d ?1?1?1?1?1?1?1
would mean use the custom char set in the mask in position 1, 2, 3, 4, 5, 6 and 7, while:
-a 3 -1 ?l?u?d ?1?1?1hcat
would mean, use the char set number 1 (-1 -> ?1) only for position 1, 2 and 3
etc

If you want to use incremental mode you define with you mask the maximum length you want to try (or you could also use --increment-max):
--increment --increment-min 8 -a 3 -1 ?l?u?d ?1?1?1?1?1?1?1?1?1?1
(this would try all password which are limited to lower letters, upper letters and digits of length 8 to 10 - since mask is no longer than 10 characters)

For more details, I kindly invite you to read this wiki page: https://hashcat.net/wiki/doku.php?id=mask_attack


BTW: bruteforcing or mask attacking a WPA/WPA2 password is in general not a very clever idea. The algorithm is a so-called slow algorithm, the speed cannot be compared to a fast algorithm such as ntlm, md5 etc. There are other attack modes that you should always consider before starting a -a 3 attack (which should always be the last thing you should try, if nothing else worked).
there are other attack modes which normally would be more clever to try first, such as wordlist attack with rules (-a 0 -r rules.txt), combinator attacks (-a 1), etc


Messages In This Thread
Brute Force WPA2 - by r9290xocl - 02-18-2015, 07:02 PM
RE: Brute Force WPA2 - by philsmd - 02-18-2015, 07:18 PM
RE: Brute Force WPA2 - by r9290xocl - 02-18-2015, 08:01 PM
RE: Brute Force WPA2 - by philsmd - 02-18-2015, 08:08 PM
RE: Brute Force WPA2 - by r9290xocl - 02-18-2015, 08:12 PM