piping incremental JtR into hashcat to crack WPA2
Hey guys,

Trying to work out the command to pipe an incremental John the Ripper into hashcat plus to crack a WPA2 key. Is this even possible? All help is appreciated.
It should, yeah. I dont know the command for jtr incremental but this should inspire you:

./john --stdout | ./oclHashcat-plus -m 2500 ...
for "incremental" : --incremental:all

Or ./john -i:all

all = the name of the charset file, it can be one who come with JTR = alpha, alnum, lanman, digits, all
For great results, find a rockyou charset and use that.
Or try this: https://hashcat.net/forum/thread-1291.html