Posts: 3
	Threads: 1
	Joined: Mar 2014
	
	
 
	
	
		Hi , Im trying to crack my WPA password for security reasons , I tried the dictionary attack with the handshake i have and it works because i already know the password, its 10 Digits , my password is "5A7CD0B11F" . i tried the option -1 ABCD...789 but i didnt find any option to set the length. 
please help  me with the right command , im using OclHashcat.
Thanks in advance.
	
	
	
	
	
 
 
	
	
	
		
	Posts: 2,935
	Threads: 12
	Joined: May 2012
	
	
 
	
	
		all you've done so far is define a custom charset, now you need to use that charset in the mask. the length is determined by the length of the mask. read the wiki pages on mask attacks for detailed examples.
	
	
	
	
	
 
 
	
	
	
		
	Posts: 3
	Threads: 1
	Joined: Mar 2014
	
	
 
	
	
		i tried this option , it doesnt work 
-1 ABCDE...789 ?1?1?1?1?1?1?1?1?1?1 file.hcap
the mask is unknown..syntaxe seems correct but i dont know whats wrong[/b]
	
	
	
	
	
 
 
	
	
	
		
	Posts: 2,301
	Threads: 11
	Joined: Jul 2010
	
	
 
	
	
		what's the error msg? and better use -1 ?u?d
	
	
	
	
	
 
 
	
	
	
		
	Posts: 2,935
	Threads: 12
	Joined: May 2012
	
	
 
	
	
		 (03-10-2014, 03:25 PM)madelmouim Wrote:  i tried this option , it doesnt work 
-1 ABCDE...789 ?1?1?1?1?1?1?1?1?1?1 file.hcap
you have the parameters backwards. the mask needs to go after the filename. this is very clear from the program help:
Code:
oclHashcat, advanced password recovery
Usage: oclHashcat [options]... hash|hashfile|hccapfile [dictionary|mask|directory]...
 
	
	
	
	
 
 
	
	
	
		
	Posts: 3
	Threads: 1
	Joined: Mar 2014
	
	
 
	
		
		
		03-11-2014, 12:17 PM 
(This post was last modified: 03-11-2014, 12:18 PM by madelmouim.)
		
	 
	
		Thank you i fixed it, but when i hit the [s]tatus key , i dont get any information. and after 8 hours of process , still 0,00 % , im not sure if this takes time or it wasnt working at all