Maskprocessor Help Windows 10
#3
(05-11-2020, 03:53 PM)philsmd Wrote: The executable is definitely within the maskprocessor folder: https://github.com/hashcat/maskprocessor/releases

Well, it would make sense to explain what attack mode you tried and how your strategy is to attack the hashes.
Maybe consider rule-based dictionary attack etc ?

brute-forcing might not be the most clever idea for slow hashes like WPA2

Thank you for that much appriciated!

I thought about the dictionary attack but it's not guarnteed to find the password, expecially if it's a password that is completely random.

If you was deturmined to get in would you use a dictionary attack and then brute force if that fails?
Reply


Messages In This Thread
Maskprocessor Help Windows 10 - by hashnewb - 05-11-2020, 03:37 PM
RE: Maskprocessor Help Windows 10 - by philsmd - 05-11-2020, 03:53 PM
RE: Maskprocessor Help Windows 10 - by hashnewb - 05-11-2020, 04:03 PM
RE: Maskprocessor Help Windows 10 - by Mem5 - 05-11-2020, 06:21 PM
RE: Maskprocessor Help Windows 10 - by Sondero - 05-11-2020, 07:01 PM
RE: Maskprocessor Help Windows 10 - by philsmd - 05-11-2020, 10:59 PM
RE: Maskprocessor Help Windows 10 - by hashnewb - 05-12-2020, 10:53 AM
RE: Maskprocessor Help Windows 10 - by philsmd - 05-12-2020, 12:03 PM
RE: Maskprocessor Help Windows 10 - by hashnewb - 05-12-2020, 12:23 PM
RE: Maskprocessor Help Windows 10 - by philsmd - 05-12-2020, 12:42 PM
RE: Maskprocessor Help Windows 10 - by hashnewb - 05-12-2020, 12:57 PM
RE: Maskprocessor Help Windows 10 - by philsmd - 05-12-2020, 01:04 PM
RE: Maskprocessor Help Windows 10 - by hashnewb - 05-12-2020, 01:41 PM