A-F 0-9 8 digit mask Help
#1
Could somebody please explain to me how to generate a 8 digit mask using 

UPPER A-F 0-9 (8 digits) MASk

i have currently tried -m 2500 -a 3 -1 ?u?d ?1?1?1?1?1?1?1?1  and got a 2yr time

im hoping to shorten this with a correct mask that uses 8 characters instead of itterating throu 1 character to 8 in increments

Anybody help me.

8 digit mask A-F 0-9  for wpa password i.e (AF12FE55)

thanks in advance
Reply
#2
hashcat -m 2500 -a 3 -1 ABCDEF?d ?1?1?1?1?1?1?1?1

If it says 2 years, it means 2 years.
Reply
#3
(02-21-2019, 04:39 AM)Chick3nman Wrote: hashcat -m 2500 -a 3 -1 ABCDEF?d ?1?1?1?1?1?1?1?1

If it says 2 years, it means 2 years.

ok, but is that incrementic from 1character then 2 then 3 upto 8 

Or just doing straight 8 characters

Thanks by the way
Reply
#4
(02-21-2019, 04:56 AM)mysterdee Wrote:
(02-21-2019, 04:39 AM)Chick3nman Wrote: hashcat -m 2500 -a 3 -1 ABCDEF?d ?1?1?1?1?1?1?1?1

If it says 2 years, it means 2 years.

ok, but is that incrementic from 1character then 2 then 3 upto 8 

Or just doing straight 8 characters

Thanks by the way

your mask reveals a 1 day wait
Reply
#5
Cool, then it will take 1 day Smile

Add "--increment-min 8" to the command to make it start at 8 characters
Reply
#6
btw, as an alternative to a custom charset (-1 etc), there is also the built-in charset ?H that does the same thing. See --help:
Code:
- [ Built-in Charsets ] -
...
H | 0123456789ABCDEF

Code:
hashcat -m 2500 -a 3 ?H?H?H?H?H?H?H?H

btw: this wouldn't affect the speed/performance at all, it just doesn't require to set your own custom charset
Reply
#7
(02-21-2019, 07:25 AM)Chick3nman Wrote: Cool, then it will take 1 day Smile

Add "--increment-min 8" to the command to make it start at 8 characters


Thanks but i get this error


increment min is only supported with increment switch

any ideas???
Reply
#8
(02-25-2019, 06:47 PM)Jiminy Wrote: the correct syntax = --increment-min=8

Take a look at the help file for the correct commands syntax.

To view the help file use hashcat --help

apparently i have to add the -i before

i got now hashcat -m 2500 -i --increment-min=8 tester.hccap  -a 3 -1 ABCDEF?d ?1?1?1?1?1?1?1?1

i take it this will do an 8 character mask starting ay 8 characters only 

not 

12 
123 
12345
123456
1234567
12345678

it will do

A83DF23A

correct...

but it stil says it will take a day n half, so no change.

that tells me that even without adding the --increment-min=8 it would still have done an 8 character mask

am i right to think this or is it doing it in increments ..

thanks.
Reply
#9
-m 2500 is WPA. WPA password cannot be less than 8 characters.
So you do NOT want to test less than 8 characters
You start at 8 up to 63 (max for WPA)

"-i --increment-min=8" is useless.
Correct syntax is:
Code:
hashcat -m 2500 -a 3 ?H?H?H?H?H?H?H?H
This will test all candidates of hexa length 8. Add another "?H" for length 9. And so on.
Depending on your GPU(s), it can take a long time..
Reply
#10
(02-25-2019, 08:06 PM)Mem5 Wrote: -m 2500 is WPA. WPA password cannot be less than 8 characters.
So you do NOT want to test less than 8 characters
You start at 8 up to 63 (max for WPA)

"-i --increment-min=8" is useless.
Correct syntax is:
Code:
hashcat -m 2500 -a 3 ?H?H?H?H?H?H?H?H
This will test all candidates of hexa length 8. Add another "?H" for length 9. And so on.
Depending on your GPU(s), it can take a long time..

Very true, any candidates less than 8 will be skipped for WPA encryption. If you are wanting to test 8+ characters, increment can still be used. Just make the mask whatever length you'd like say 12 (which would take a million years) and append increment to hashcat to start from 8 and move forward from there. 

Example

Code:
hashcat64.exe -m 2500 -a 3 -w 4 -i --increment-min 8 --increment-max 10 hash.txt ?H?H?H?H?H?H?H?H?H?H?H?H

So even though we have a mask length of 12 it will only attack from 8 to 10, beginning with 8. Uppercase Hex is not a very efficient attack however. I would investigate further into the router for a more suitable attack, such as default passwords from images and if a key generator is available. Can also try pixiedust for a quick wps exploit or reaver/bully if you are in range of the AP for long enough (typically 4 hours).
Reply