Posts: 2
Threads: 1
Joined: Mar 2020
HI TO ALL,
I WANT BRUTE-FORCE WITHOUT PASSWORDLIST.TXT BY HASHMODE: 2501 FOR CRACKING WPA/WPA2 .CAP HANDSHAKE FILE. OR ANY FASTEST WAY EVER.
IS THERE ANYONE TO GUIDE ME?
Posts: 2
Threads: 1
Joined: Mar 2020
Please......
Posts: 803
Threads: 135
Joined: Feb 2011
03-21-2020, 06:26 PM
(This post was last modified: 03-21-2020, 06:29 PM by Mem5.)
Please do not write in CAPITALS.
Never used this mode before, so I assume:
- mode 2501 (or 22001) need a known PMK
- mode 2500 (or 22000) DOES compute PMK through hash_pbkdf2(), while mode 2501 don't, that's why 2501 is faster.
So.. to use mode 2501 you need to compute a PMK with a given ESSID and a password before launching hashcat mode 2501 (or 22001) against your hccapx/hash.
According to Zerbea, the tool
wlangenpmkocl is the choice to precalculate PMKs for hashcat (just realized that this tool has not been updated since 2018)