Decrypting WPA-EAPOL-PBKDF2 quiestion ?
#1
Information 
hi ,,,
i am using -m 2500 attack trying to decrypt WPA , i already tried all possible numbers 8 long using mask
"?d?d?d?d?d?d?d?d"
now i need to make hashcat trying 8 password long of lower,upper letter and number combination , but i don't want it to waste time trying combination of numbers only since i already tried them , how can i force hashcat doing so ?
Reply
#2
you need to run multiple masks, each one with a position that does not include a digit

hcmask example:
?l?u?d,?l?u,?2?1?1?1?1?1?1?1
?l?u?d,?l?u,?1?2?1?1?1?1?1?1

?l?u?d,?l?u,?1?1?1?1?1?1?1?2

but this attack is going to take a long time.
Reply
#3
(12-09-2020, 01:46 PM)undeath Wrote: you need to run multiple masks, each one with a position that does not include a digit

hcmask example:
?l?u?d,?l?u,?2?1?1?1?1?1?1?1
?l?u?d,?l?u,?1?2?1?1?1?1?1?1

?l?u?d,?l?u,?1?1?1?1?1?1?1?2

but this attack is going to take a long time.

thanks a lot , yeah a lot of time ,i just thought that there is a way to prevent hashcat from using numbers only in the attack .
Reply