Alphanumeric password + signs
#1
Hello. I'm trying to learn, but I can't get a mask that gets a wifi password of a size of between 6 and 12 characters, which can be uppercase and lowercase letters, numbers and signs.
Reply
#2
(09-27-2021, 02:33 AM)LasPer Wrote: Hello. I'm trying to learn, but I can't get a mask that gets a wifi password of a size of between 6 and 12 characters, which can be uppercase and lowercase letters, numbers and signs.

Hey

The mask you want to use is "?a"

So for 6 it would be "?a?a?a?a?a?a"

Just be aware, even if you have a great machine that around 8 characters this will take years to finish
Reply
#3
This will do it:
Code:
I prefer this:
$ hashcat --stdout -i --increment-min=6 -a 3 -1 ?l?u?d?s ?1?1?1?1?1?1?1?1?1?1?1?1
because it is better to modify, e.g. if you need other sets of characters (-1 ?l?u), without typing the entire mask again
which is the same as:
$ hashcat --stdout -i --increment-min=6 -a 3 ?a?a?a?a?a?a?a?a?a?a?a?a

Information how to use masks is here:
https://hashcat.net/wiki/doku.php?id=mask_attack

But it doesn't make sense to do this on WPA
Code:
$ hashcat -m 22000 hashfile.hc22000 -i --increment-mi=6 -a 3 -1 ?l?u?d?s ?1?1?1?1?1?1?1?1?1?1?1?1
because:

The minimum length of a WPA-PSK (according to 802.11 specification) is 8 characters:
https://www.skillset.com/questions/what-...characters
All PSKs below 8 characters are rejected by hashcat if you try it on hashmode 22000

The calculated key space is really big and PBKDF2 (used to calculate the PMK) is a very slow algo.
If you don't have much GPU power (e.g. several machines, running 8 x RTX3090), it will take a while to recover the PSK.
https://en.wikipedia.org/wiki/Pbkdf2
Reply
#4
Thanks. It helped me.
Reply