WPA2 Cracking With Password Less Then 8 Length Using rule Attack
#2
It seems that you also opened a hashcat github issue (https://github.com/hashcat/hashcat/issue...-292860873) and it was answered and closed.

Please do not hesitate to use the forum search function next time.

Thread closed



btw: just to make sure that there aren't any new users that believe that "$?d $d? $d? $d?" is really a valid rule: You are mixing up rule syntax with mask syntax, this is not valid at all (and furthermore you use "?d" and "d?", which is also wrong). You either have to generate a set of rules, or use something like -a 6 dict.txt ?d?d?d?d ("$?d" does NOT append all digits, you need to use $0, $1, $2, $3, ..., $9 instead).


Messages In This Thread
RE: WPA2 Cracking With Password Less Then 8 Length Using rule Attack - by philsmd - 04-10-2017, 09:41 AM