Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.
hashcat Forum
piping incremental JtR into hashcat to crack WPA2 - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html)
+--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html)
+--- Thread: piping incremental JtR into hashcat to crack WPA2 (/thread-1486.html)



piping incremental JtR into hashcat to crack WPA2 - Night_Reaper - 08-21-2012

Hey guys,

Trying to work out the command to pipe an incremental John the Ripper into hashcat plus to crack a WPA2 key. Is this even possible? All help is appreciated.


RE: piping incremental JtR into hashcat to crack WPA2 - atom - 08-21-2012

It should, yeah. I dont know the command for jtr incremental but this should inspire you:

./john --stdout | ./oclHashcat-plus -m 2500 ...


RE: piping incremental JtR into hashcat to crack WPA2 - tony - 08-22-2012

for "incremental" : --incremental:all

Or ./john -i:all

all = the name of the charset file, it can be one who come with JTR = alpha, alnum, lanman, digits, all


RE: piping incremental JtR into hashcat to crack WPA2 - me.scotty - 08-22-2012

For great results, find a rockyou charset and use that.


RE: piping incremental JtR into hashcat to crack WPA2 - atom - 08-22-2012

Or try this: https://hashcat.net/forum/thread-1291.html