NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Wireless Cracking - Help setting up attack charset on vm

WARNING!
Due to the number of SCAMS going on in the PAID forum, PLEASE ask an ADMIN or MODERATOR to verify ALL found passwords to ensure you are not being SCAMMED.
DO NOT PAY until an ADMIN or MOD has verified them for you!


2 Results - Page 1 of 1 -
1
Author Message
Avatar
thenewguy

Status: n/a
Joined: Sun, 20 Jan 2019
Posts: 10
Team:
Reputation: 0 Reputation
Offline
Thu, 24 Jan 2019 @ 10:51:14

Hi there

I just cracked my first wpa2 in just under 2 days. vm.2g

Im now moving onto my next which is slightly harder.

I need to use VMXXXXXXX [0-9a-zA-Z] Len:12


How would i set this the gui under brute force. my last one was

charset abcdefghjklmnpqrstuvwxyz

mask ?1?1?1?1?1?1?1?1


Do i have to use

1.0123456789

2.abcdefghijklmnopqrstuvwxyz

3.ABCDEFGHIJKLMNOPQRSTUVWXYZ

Mask

Thanks in advance.


Avatar
dipeperon

Status: n/a
Joined: Tue, 03 Apr 2018
Posts: 285
Team:
Reputation: 380 Reputation
Online
Thu, 24 Jan 2019 @ 12:45:14

[0-9a-zA-Z] is: ?u?l?d

So:

-1 ?u?l?d

keyspace is 62 per unknown character. So guessing 7 characters would have a keyspace of 62^7. Which is pretty damn high for WPA


My haschat stuff (rules, scripts): https://github.com/theherp/Hashcat-stuff
BTC: 3C2h4xscGRq7XfZLicoVjRVkYrqqJ1Urc5


2 Results - Page 1 of 1 -
1

We have a total of 170576 messages in 21366 topics.
We have a total of 19405 registered users.
Our newest registered member is SeopermCon.