Hi all,
I think I found a bug.
I'm trying the WPA/WPA2 cracking, but unfortunately all the words that are less than 8 characters are getting rejected, since the minimum length of WPA passwords are 8 characters.
The problem is that I'm trying with a rule based attack which adds characters to the original word, so the end result is 8 characteres long, but hashcat only checkes the original word.
word + rule: ^0^0^0^0 results in: "0000word" but still gets rejected.
Any idea?
I guess the only workaround is to pregenerate the wordlist with the extra characters, but it's not really a flexible way.
BRs
/Andras
I think I found a bug.
I'm trying the WPA/WPA2 cracking, but unfortunately all the words that are less than 8 characters are getting rejected, since the minimum length of WPA passwords are 8 characters.
The problem is that I'm trying with a rule based attack which adds characters to the original word, so the end result is 8 characteres long, but hashcat only checkes the original word.
word + rule: ^0^0^0^0 results in: "0000word" but still gets rejected.
Any idea?
I guess the only workaround is to pregenerate the wordlist with the extra characters, but it's not really a flexible way.
BRs
/Andras