reject bug when using wordlist + rule attack on WPA/WPA2 hash
#3
(10-16-2019, 07:38 PM)philsmd Wrote: rules are applied on GPU for performance reasons (after the fact, after the rejection routine) and we can't really filter each and every combination correctly on GPU (syncing this would be very complex and make everything very slow).

there are 2 known workarounds (might be much slower than without them):
1. use -S
2. use a pipe: hashcat --stdout -r a.rule dict.txt | hashcat -a 0 -w 3 -m 2500 my.hccapx

Worked Thanx Smile.
Reply


Messages In This Thread
RE: reject bug when using wordlist + rule attack on WPA/WPA2 hash - by hworm4 - 10-16-2019, 11:45 PM