02-14-2012, 04:59 PM
Hey all, I have been playing around with maskprocessor emulating bruteforce and was wondering whether
it is possible to reverse the incrementation.
I'll try to explain what I am trying as best as possible ;
If we know that the first 4 characters of an 8-10 character WPA passphrase are 'abcd' followed by
lower alpha characters then you would be able to start maskprocessor with increments as follows ;
If on the other hand you know that the last 4 characters are for instance 'wxyz' is there a way to have the
first characters increment from 4 to 6 characters or is manual the only way to go ?
as
of course starts by taking the first 8 characters which excludes the last 2 characters of what I would want fixed.
I am not sure if this is even possible, but I am a complete newb with maskprocessor,
so any guidance from the pros much appreciated !
it is possible to reverse the incrementation.
I'll try to explain what I am trying as best as possible ;
If we know that the first 4 characters of an 8-10 character WPA passphrase are 'abcd' followed by
lower alpha characters then you would be able to start maskprocessor with increments as follows ;
Code:
mp64.exe -i --increment-min=8 abcd?l?l?l?l?l?l
result: abcdaaaa -- abcdzzzzzz
If on the other hand you know that the last 4 characters are for instance 'wxyz' is there a way to have the
first characters increment from 4 to 6 characters or is manual the only way to go ?
as
Code:
mp64.exe -i --increment-min=8 ?l?l?l?l?l?lwxyz
I am not sure if this is even possible, but I am a complete newb with maskprocessor,
so any guidance from the pros much appreciated !