![]() ![]() Let's assume you want to use CPU because you said you haven't strong processor capacity.Ĭommand for hashcat = 3: hashcat -m 2500 -a 0 "/path/to/your/converted_file" "/path/to/your/dictionary_file" -r "/path/to/your/rules_fie" -o "/path/to/your/pot_file" -D 1 -force Now, with hashcat v3, there is only one executable for all and only change the parameters to select what you want to do (CPU, GPU). Before version 3, there were different executable files to use CPU and GPU. Hashcat has changed recently its way to work. ![]() For example, in Kali Linux you have a lot of them in the /usr/share/hashcat/rules folder. ![]() So many pentesting Linux distros already have rule files to be used on rule based attacks like this I'm propossing you. The point is to try to get the password "playing" with these rules and the dictionary files and believe me. The rule files creators are so imaginative! Some of them combine a lot of them and can be complicated. Others tranform the words in l337, or whatever. Some of them exchange letters, other add prefixes, suffixes. This rules depend of the rule file you use. Rule based attacks combine words in dictionary with some rules. Now you can use GPU which is more powerful than CPU to bruteforce.īut even if is not an option for you, you can use for example rule based attacks with hashcat. Then, once the file is in hascat format, there is a new world of possibilities. The -J parameter is to convert the file from one format to hashcat format. Of course you must put your paths and the BSSID of the network you want to recover the password. To convert a captured file to hashcat format you must do: aircrack-ng /path/to/handshake.cap -J /path/to/converted_file -b 00:11:22:33:44:55. Aircrack only support dictionary and bruteforce attacks but you can convert the file into other format to be used with another tool. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |