Posts: 31
Threads: 7
Joined: Apr 2018
I'm cracking wpa/wpa2 with hashcat 4.1.0. Workload profile -w 4 was included. Always hashcat froze desktop after 10-15 hours of cracking. Hashcat freeze PC at "mjklpr42"password. Does exist any way to continue cracking from that password to "zzzzzz99" without wordlist?
Posts: 14
Threads: 0
Joined: Mar 2018
Use --restore option to resume attack from last restore point. If you didn't specify a session name with your attack, it will be named hashcat
hashcat --restore or hashcat --session sessionname --restore
Posts: 31
Threads: 7
Joined: Apr 2018
Thanks God, I'll try it. I found out one more way. We can apply -s or --skip option -s mjklpr42, too.
Posts: 2,301
Threads: 11
Joined: Jul 2010
05-15-2018, 01:32 PM
(This post was last modified: 05-15-2018, 01:32 PM by undeath.)
(05-15-2018, 01:11 PM)camer333 Wrote: We can apply -s or --skip option -s mjklpr42, too.
no. --skip does not accept candidates
Posts: 31
Threads: 7
Joined: Apr 2018
05-15-2018, 01:59 PM
(This post was last modified: 05-15-2018, 06:35 PM by camer333.)
Not accept in single hashcat, but accepts candidates in merge with maskprocessor. In maskprocessor -s means start word something like a skip...