Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: piping incremental JtR into hashcat to crack WPA2
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hey guys,

Trying to work out the command to pipe an incremental John the Ripper into hashcat plus to crack a WPA2 key. Is this even possible? All help is appreciated.
It should, yeah. I dont know the command for jtr incremental but this should inspire you:

./john --stdout | ./oclHashcat-plus -m 2500 ...
for "incremental" : --incremental:all

Or ./john -i:all

all = the name of the charset file, it can be one who come with JTR = alpha, alnum, lanman, digits, all
For great results, find a rockyou charset and use that.