NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Wireless Cracking - Help setting up attack charset on vm


2 Results - Page 1 of 1 -
1
Author Message
Avatar
thenewguy

Status: n/a
Joined: Sun, 20 Jan 2019
Posts: 10
Team:
Reputation: 0 Reputation
Offline
Thu, 24 Jan 2019 @ 10:51:14

Hi there

I just cracked my first wpa2 in just under 2 days. vm.2g

Im now moving onto my next which is slightly harder.

I need to use VMXXXXXXX [0-9a-zA-Z] Len:12


How would i set this the gui under brute force. my last one was

charset abcdefghjklmnpqrstuvwxyz

mask ?1?1?1?1?1?1?1?1


Do i have to use

1.0123456789

2.abcdefghijklmnopqrstuvwxyz

3.ABCDEFGHIJKLMNOPQRSTUVWXYZ

Mask

Thanks in advance.


Avatar
dipeperon

Status: n/a
Joined: Tue, 03 Apr 2018
Posts: 337
Team:
Reputation: 401 Reputation
Offline
Thu, 24 Jan 2019 @ 12:45:14

[0-9a-zA-Z] is: ?u?l?d

So:

-1 ?u?l?d

keyspace is 62 per unknown character. So guessing 7 characters would have a keyspace of 62^7. Which is pretty damn high for WPA


My haschat stuff (rules, scripts): https://github.com/theherp/Hashcat-stuff
BTC: 3C2h4xscGRq7XfZLicoVjRVkYrqqJ1Urc5


2 Results - Page 1 of 1 -
1

We have a total of 184636 messages in 22866 topics.
We have a total of 20637 registered users.
Our newest registered member is Babank.