Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Cracking WPA Handshake With Hashcat (Or Third Party)
I have a WPA2 handshake capture I'm trying to bruteforce with a capture. I run Kali on a Vbox so any cudahashcat is out as far as options go. I'm told there are places online where I can upload and pay/wait that use higher end processing/GPUs to crack these. I'm wondering if anyone can refer me to one of these sites that is still operational. Additionally, I'm struggling to understand the hashcat commands for a mask attack. If we assume it's 8 chars (which most can/likely are more) how do I input it so that the first variable is capital letter and the rest of the remaining 7 are a lowercase letter or a number? I can upload or send the .cap if needed. Thank you.


Forum Jump:

Users browsing this thread: 1 Guest(s)