Posts: 3
Threads: 1
Joined: Mar 2014
Hi , Im trying to crack my WPA password for security reasons , I tried the dictionary attack with the handshake i have and it works because i already know the password, its 10 Digits , my password is "5A7CD0B11F" . i tried the option -1 ABCD...789 but i didnt find any option to set the length.
please help me with the right command , im using OclHashcat.
Thanks in advance.
Posts: 2,936
Threads: 12
Joined: May 2012
all you've done so far is define a custom charset, now you need to use that charset in the mask. the length is determined by the length of the mask. read the wiki pages on mask attacks for detailed examples.
Posts: 3
Threads: 1
Joined: Mar 2014
i tried this option , it doesnt work
-1 ABCDE...789 ?1?1?1?1?1?1?1?1?1?1 file.hcap
the mask is unknown..syntaxe seems correct but i dont know whats wrong[/b]
Posts: 2,301
Threads: 11
Joined: Jul 2010
what's the error msg? and better use -1 ?u?d
Posts: 2,936
Threads: 12
Joined: May 2012
(03-10-2014, 03:25 PM)madelmouim Wrote: i tried this option , it doesnt work
-1 ABCDE...789 ?1?1?1?1?1?1?1?1?1?1 file.hcap
you have the parameters backwards. the mask needs to go after the filename. this is very clear from the program help:
Code:
oclHashcat, advanced password recovery
Usage: oclHashcat [options]... hash|hashfile|hccapfile [dictionary|mask|directory]...
Posts: 3
Threads: 1
Joined: Mar 2014
03-11-2014, 12:17 PM
(This post was last modified: 03-11-2014, 12:18 PM by madelmouim.)
Thank you i fixed it, but when i hit the [s]tatus key , i dont get any information. and after 8 hours of process , still 0,00 % , im not sure if this takes time or it wasnt working at all