sense word mask attack (hashcat WPA/2)
#1
I've tried a lot of masks for bruteforce attacks. My graphic card gets about 95K H/s for WPA/WPA2. I'm not satisfied with -a 3 legacy results. We can guess password as sense word of some language. For some languages there are 2-3 repeating same letter. Sense word hasn't more than 3 same letters. I'm trying to making sense word with letters repeating. How to apply hashcat mask with determined number of letters repeating? Does exist that option? It will speed up whole procces.


Messages In This Thread
sense word mask attack (hashcat WPA/2) - by camer333 - 04-16-2018, 01:50 PM