reflex16 Posted November 13, 2020 Share Posted November 13, 2020 Hi, I am a novice hashcat user and am having trouble setting proper masks in WPA2. I know that the password is 8 characters long and contains capital letters and numbers, e.g. 94HA6CUE The command I use is: Quote hashcat.exe -m 2500 -a 3 -w 3 upc.hccapx --session testmoj --increment --increment-min 8 --increment-max 8 -o wynik3.txt -1 ?u?d ?1?1?1?1?1?1?1?1 --force The number of combinations is over ~ 2.8 trillion = approx. 10 years. I would like to reduce the number of combinations knowing that the password contains: 1. min. 3 - 4 numbers (?d) [e.g. ok - 94HA6CUE-?d?d?u?u?d?u?u?u ; 94HA6CU6-?d?d?u?u?d?u?u?d / nok - A4HA6CUE-?u?d?u?u?d?u?u?u ; 94HA6C56-?d?d?u?u?d?u?d?d] 2. min. 4 - 5 letters (?u) [e.g. ok - 94HA6CU6-?d?d?u?u?d?u?u?d ; 94HA6CUE-?d?d?u?u?d?u?u?u / nok - 94HA6C56-?d?d?u?u?d?u?d?d ; A4HA6CUE-?u?d?u?u?d?u?u?u] 3. not more than 3 same numbers (?d) and letters (?u) [e.g. ok - 995A9CUE-?d?d?d?u?d?u?u?u ; 995A9CAA-?d?d?d?u?d?u?u?u / nok - 999A9CUE-?d?d?d?u?d?u?u?u ; 99AA9CAA-?d?d?u?u?d?u?u?u] 4. not more than 3 numbers next to each other (?d) [e.g. ok 946ABCUE-?d?d?d?u?u?u?u?u / nok - 9462ACUE-?d?d?d?d?u?u?u?u ; AHHA6956-?u?u?u?u?d?d?d?d] 5. not more than 2 same numbers (?d) and letters (?u) next to each other [e.g. ok - 99HA6CUE-?d?d?u?u?d?u?u?u ; 99HA6CUU-?d?d?u?u?d?u?u?u / nok - 999A6CUE-?d?d?d?u?d?u?u?u ; 99HA6UUU-?d?d?u?u?d?u?u?u] For the above, I use the command: Quote mp64.exe -q 4 -r 5 -1 ?u?d ?1?1?1?1?1?1?1?1 | hashcat.exe -m 2500 -a 3 -w 3 upc.hccapx --session testmoj --increment --increment-min 8 --increment-max 8 -o wyniki3.txt -1 ?u?d ?1?1?1?1?1?1?1?1 --force Quote You have enabled --force to bypass dangerous warnings and errors! This can hide serious problems and should only be done when debugging. Do not report hashcat issues encountered when using --force. OpenCL API (OpenCL 2.1) - Platform # 1 [Intel (R) Corporation] ================================================== =========== * Device # 1: Intel (R) UHD Graphics 620, 2421/2485 MB (1242 MB allocatable), 24MCU Minimum password length supported by kernel: 8 Maximum password length supported by kernel: 63 Hashes: 1 digests; 1 unique digests, 1 unique salts Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates Applicable optimizers applied: * Zero-Byte * Single-Hash * Single-Salt * Brute-Force * Slow-Hash-SIMD-LOOP Watchdog: Hardware monitoring interface not found on your system. Watchdog: Temperature abort trigger disabled. Host memory required for this attack: 116 MB [s] tatus [p] ause [b] ypass [c] heckpoint [q] uit => -------------------------------------------------- ------------------------------------- When I want to check the status [s], nothing happens, and after exiting Ctrl + C something like this appears: Quote [s]tatus [p]ause [b]ypass [c]heckpoint [q]uit => ^C^C C:\Users\pama.dva\Desktop\upc\hashcat-6.1.1>s DNS server not authoritative for zone. The question is: 1. What will the correct mask command look like with my rules? Can someone write it to me and explain it? 2. What am I doing wrong and why are my commands not working? I read the hashcat wiki tutorial, but I still can't quite understand everything because my English is poor... I am asking for help because I have been working on it for the second week and I do not have the strength to do it... Thank you Quote Link to comment Share on other sites More sharing options...
kuyaya Posted November 15, 2020 Share Posted November 15, 2020 I don't know exactly - I'm not an expert. However, there are more people active here on our Hak5 Discord, mabye someone there is able to help you. https://discord.gg/Z2jsSWyT Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.