[ANSWERED] New user, custom brute force help
#11
I'm trying to decrypt 2500 WPA2
#12
Not much to go on to help you here.

Please also note that you're not 'decrypting' - there is no 'reversing' or 'decrypting' of true hashes. Hashes are not encryption. When you're trying to crack a hash, you're hashing many strings until a hash matches the hash you have.
~
#13
you won't complete that brute force attack within your lifetime with a single high end gpu.
#14
(05-12-2018, 07:56 PM)h1430210 Wrote: For 10 digits using no numbers, uppercase letters, lowercase letters, @, #, and $,
You would use

hashcat -a 3 -m<whatever it is> <hashfile> -1 ?l?u@#$ ?1?1?1?1?1?1?1?1?1?1

Thanks man ! gota put the rig to work now ! Estimated time to crack password 2 years lol
#15
(05-14-2018, 12:07 AM)cryptozin Wrote:
(05-12-2018, 07:56 PM)h1430210 Wrote: For 10 digits using no numbers, uppercase letters, lowercase letters, @, #, and $,
You would use

hashcat -a 3 -m<whatever it is> <hashfile> -1 ?l?u@#$ ?1?1?1?1?1?1?1?1?1?1

Thanks man ! gota put the rig to work now ! Estimated time to crack password 2 years lol

Is there a way to save the cracking progress? In case of pc crash or energy down etc? So doesn`t have to start over?
#16
Yep, that happens automatically - state is saved periodically to a restore file, and you use --restore to restore.
~
#17
(05-14-2018, 12:59 AM)royce Wrote: Yep, that happens automatically - state is saved periodically to a restore file, and you use --restore to restore.

Nice ! Thanks Royce.