05-08-2016, 05:30 PM
Hi all,
I just discovered oclHashcat yesterday, great piece of software!
I'm just after some advice on the best/most efficient way of obtaining WPA pass-phrases (-m 2500).
I've read through the information on the site, and gone over the mask-attack information, but tbh I didn't really fully grasp it 100%.
I've got the 4 way handshake files from my router, and I know the current WPA password is: k3t3kyta
What would be the best way of obtaining the above password from the files? I'm currently running the below command, but unsure if there is a better/faster way?
-m 2500 .\handshakes\output.hccap -a 3 -1 ?l?d ?1?1?1?1?1?l?l?l
Basically just trying to figure out the most efficient command/mask for a password length of 8, which could possibly contain numbers at any point within the password.
Thanks for any help or suggestions you can offer
I just discovered oclHashcat yesterday, great piece of software!
I'm just after some advice on the best/most efficient way of obtaining WPA pass-phrases (-m 2500).
I've read through the information on the site, and gone over the mask-attack information, but tbh I didn't really fully grasp it 100%.
I've got the 4 way handshake files from my router, and I know the current WPA password is: k3t3kyta
What would be the best way of obtaining the above password from the files? I'm currently running the below command, but unsure if there is a better/faster way?
-m 2500 .\handshakes\output.hccap -a 3 -1 ?l?d ?1?1?1?1?1?l?l?l
Basically just trying to figure out the most efficient command/mask for a password length of 8, which could possibly contain numbers at any point within the password.
Thanks for any help or suggestions you can offer