increment gives invlaid mask error
#1
I can run this fine without the --increment.  But once I try to use it I get an invalid mask error.
(tried adding in a min/max too.  And moving the switches' order around a bit)
So where is my brainfart?

Code:
$ Hashcat64.bin  -m 2500  -a 6  ./wifi.hccap  ./dictionary.txt  ?d?d?d?d --increment

hashcat (v3.20) starting...

OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: GeForce GTX 1070, 2036/8144 MB allocatable, 15MCU
* Device #2: GeForce GTX 1070, 2036/8145 MB allocatable, 15MCU

Generated bitmap tables...Invalid mask
#2
WPA passphrases require a minimum length of 8. I'm also not sure if/how the --increment option is applied in this hybrid attack mode - maybe it's not meant to be used outside a direct mask attack?
#3
--increment is only valid with -a 3
#4
I had added support for this to hashcat v3.20, but it was bugged in case of WPA. Should be fixed with latest beta on https://hashcat.net/beta/
#5
Thanks Atom!
I thought it *should* work, and did do a cursory look-see for known issues, and what not before posting.
I'm cool if it gets fixed or not.  (been diggin' big time doing bash scripting.  Almost to a hashview level)
I'm also cool with waiting for a official release.  I dig on betas, and also hate them (linux seems to be nothing but a beta ~20 in)  Hashcat, works *so* well, I'm good waiting for official releases.



(12-18-2016, 05:03 PM)atom Wrote: I had added support for this to hashcat v3.20, but it was bugged in case of WPA. Should be fixed with latest beta on https://hashcat.net/beta/
#6
Anything under 8 char (total), gets tossed into the 'rejected' part.

(12-13-2016, 04:03 PM)rico Wrote: WPA passphrases require a minimum length of 8. I'm also not sure if/how the --increment option is applied in this hybrid attack mode - maybe it's not meant to be used outside a direct mask attack?