piping incremental JtR into hashcat to crack WPA2 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html) +--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html) +--- Thread: piping incremental JtR into hashcat to crack WPA2 (/thread-1486.html) |
piping incremental JtR into hashcat to crack WPA2 - Night_Reaper - 08-21-2012 Hey guys, Trying to work out the command to pipe an incremental John the Ripper into hashcat plus to crack a WPA2 key. Is this even possible? All help is appreciated. RE: piping incremental JtR into hashcat to crack WPA2 - atom - 08-21-2012 It should, yeah. I dont know the command for jtr incremental but this should inspire you: ./john --stdout | ./oclHashcat-plus -m 2500 ... RE: piping incremental JtR into hashcat to crack WPA2 - tony - 08-22-2012 for "incremental" : --incremental:all Or ./john -i:all all = the name of the charset file, it can be one who come with JTR = alpha, alnum, lanman, digits, all RE: piping incremental JtR into hashcat to crack WPA2 - me.scotty - 08-22-2012 For great results, find a rockyou charset and use that. RE: piping incremental JtR into hashcat to crack WPA2 - atom - 08-22-2012 Or try this: https://hashcat.net/forum/thread-1291.html |