Brute Force on WPA/WPA2
#4
(08-27-2012, 05:05 PM)qwerty Wrote:
(08-27-2012, 09:47 AM)radix Wrote: You didn't specify a mask.
Yes, I know. But what it will be correct mask if i want break password with a...z, A...Z, 0...9 in all combinations?
I don't understand this: http://hashcat.net/wiki/doku.php?id=mask_attack

-1 ?l?u?d ?1?1?1?1?1 etc...

-1 = custom_charset, same for -2, -3, -4

?l : Lower_alpha or more specificaly = abcdefghijklmnopqrstuvwxyz
?u: UperCase or more specificaly = ABCDEFGHIJKLMNOPQRSTUVWXYZ
?d : Digits or more specificaly = 0123456789

& "?1" is the length so if you whant to BF an 4 Length one : ?1?1?1?1


Messages In This Thread
Brute Force on WPA/WPA2 - by qwerty - 08-27-2012, 09:44 AM
RE: Brute Force on WPA/WPA2 - by radix - 08-27-2012, 09:47 AM
RE: Brute Force on WPA/WPA2 - by qwerty - 08-27-2012, 05:05 PM
RE: Brute Force on WPA/WPA2 - by tony - 08-27-2012, 11:12 PM
RE: Brute Force on WPA/WPA2 - by qwerty - 08-28-2012, 06:13 PM
RE: Brute Force on WPA/WPA2 - by Pixel - 08-28-2012, 06:30 PM