Help using oclhashcat .hccap file
#1
Rainbow 
Hi all I am new to this but managed to grab a handshake from a WPA2, WPS router.  .cap file converted now to a .hccap file.  I know the password is 16 digits long with both capital letters and numbers.  I'm not sure how to write the command for this.  Currently using The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) linux and read oclhashcat would be faster since it uses my GPU.

Can this be done in The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) linux (VMware) or should I run straight from my PC?
What would the command be?

Sorry for asking I'm sure, a stupid question.

Thank you all for the help!

Cheers!
#2
oclhashcat is no longer being used? hmm.
#3
right now atm I am using crunch 16 16 ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890 | aircrack-ng /root/capfile.cap -b 00-00-00-00-00-00 -w-

Looks like it may take months. Can hashcat do better?

Thanks!
#4
1. use hashcat 3.40 (or higher, beta: https://hashcat.net/beta/)
2. use hccapx files (convert your caps with cap2hccapx from hashcat-utils or the converter: https://hashcat.net/cap2hccapx/
3. use some more intelligent attack, not brute-force, maybe dict attack? (mask attack would be like hashcat -w 4 -m 2500 -a 3 -1 ?u?d hccapxfile.hccapx ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1 , but the keyspace is not feasible!)
4. understand that length 16 is very, very, very long! Too long for brute-force! And it wouldn't just "take months", it would take thousands of years even if you would have the best and largest amount of hardware