I need to bruteforce a .hccapx file which includes a WPA2 handshake, because a dictionary attack didn't work. How can I do that with HashCat? I don't know about the length etc.
Thanks!
I need to bruteforce a .hccapx file which includes a WPA2 handshake, because a dictionary attack didn't work. How can I do that with HashCat? I don't know about the length etc.
Thanks!
First of all, you should use this at your own risk. Don't do anything illegal with hashcat.
If you want to perform a bruteforce attack, you will need to know the length of the password. The following command is and example of how your scenario would work with a password of length = 8.
The
-a 3
denotes the "mask attack" (which is bruteforce but more optimized).The
-m 2500
denotes the type of password used in WPA/WPA2.The
capture.hccapx
is the .hccapx file you already captured.The
?d?d?d?d?d?d?d?d
denotes a string composed of 8 digits.If you want to specify other charsets, these are the following supported by hashcat: