I am wanting to crack a WPA2 hash and output the password to hash.txt 
I know the WPA key is 10 characters long and consists of A-F and 0-9
(EG FC2B8D9F8A)
As far as I can gather this works
cudaHashcat64 -m 2500 -a 3 --status-timer=10 -1 ?dABCDEF -o hash.txt cap.hccap ?1?1?1?1?1?1?1?1?1?1
but is it working the way I hope it is?
	
	
	
	
I know the WPA key is 10 characters long and consists of A-F and 0-9
(EG FC2B8D9F8A)
As far as I can gather this works
cudaHashcat64 -m 2500 -a 3 --status-timer=10 -1 ?dABCDEF -o hash.txt cap.hccap ?1?1?1?1?1?1?1?1?1?1
but is it working the way I hope it is?
 
 

 

 
 
		
 Will do that from now on, does make sense
 Will do that from now on, does make sense