Status description
#2
for status updates every 30 seconds, you need to use:
--status --status-timer 30

1. The mask (that you didn't specify, it's the default one, see: https://hashcat.net/wiki/doku.php?id=has...ult_values)
2. The custom charset (that you didn't specify, it's the default one, see ^ )
3. if you didn't specify any mask, the default mask is used together with --increment, in this case it starts to increase the password length from 8 characters up to 16 characters (that's why it's 1 of 8)
4. how many hashes/digests (and salts) have been cracked of the total hashes (and salts)
5. how many password candidates are too short (or long), minimum for WPA is 8 byte passwords
6. this is used together with --restore (the outer loop of hashcat) to restore sessions if hashcat was quitted/stopped (if the restore value > 0)
7. indicates how deep we are into the current iteration etc (if the algorithm is iterated) to reach the next restore point
8. some passwords that are currently tested (just an indication, of course they change very quickly every millisecond or smaller)
9. temperature of the hardware (GPU), current GPU fan speed, the utilization (is the GPU running at 100% ?), core clock and memory clock, the PCI BUS speed (number of lanes)

I would suggest using your own mask and custom charset to not get confused about which passwords are tested and to really tell hashcat what you want to run in your specific situation, e.g.

Code:
hashcat64.exe -m 2500 -a 3 -w 4 --custom-charset1 ?l?u?d --increment --increment-min 8 C:\hccapx\test.hccapx ?1?1?1?1?1?1?1?1?1

the --custom-charset1 means that you want to combine several character sets into a new one, in this case all lower case letters (?l), plus all upper-case letters (?u) and all numbers (?d). The ?1?1?1?1?1?1?1?1?1 is the actual mask and says that the maximum length of the passwords should be 9 (because we have 9 times ?1) and that at each position the custom charset defined by --custom-charset1 (or short -1, think of "minus one" not the letter L) is used.
Masks can also be very different like using more custom charset and using fixed chars (and example is: ?1?1?1?3?3ABC?d?d, here "ABC" is a constant/fixed substring and this mask also uses ?d directly at position 9 and 10 of the password.... the mask is always positional... each position must have it's charset or constant/fixed chars)

BTW: all these details are also explained in the Wiki/FAQ (and several things even in the --help output), see for instance: https://hashcat.net/wiki/doku.php?id=mask_attack
Reply


Messages In This Thread
Status description - by Homo Erectus - 02-19-2020, 09:11 AM
RE: Status description - by philsmd - 02-19-2020, 09:43 AM
RE: Status description - by Homo Erectus - 02-19-2020, 08:26 PM