[Legion Leak] WPA Dictionary Attack and Hashcat Rules Part 2 08-05-2013, 09:45 AM
#1
This post is leaked from the premium section of "Legion" on the competing hack forum. There will be 5 new leaks a day. There may be some format problems due to UTF8 character encoding.
(07-10-2013, 01:23 PM)Greyhat.Infiltrator Wrote:
On my last WPA Cracking tutorial which can be found in the link below,
( http://www.hackforums.net/showthread.php?tid=3458431 )
I showed how to do a Dictionary Attack against a WPA Handshake in Windows using Hashcat.
However, this time around I will show how to use "Rules" in Hashcat to increase the chances of cracking your captured WPA key.
If you don't know what I am talking about, please spend sometime reading this Hashcat documentation to understand what "Rules" is all about.
( http://hashcat.net/wiki/doku.php?id=rule_based_attack )
The video below will demonstrate how powerful "Rules" can be, and why you should always use it, when cracking your WPA Handshake.
Hashcat command without rules applied.
Code:cudaHashcat-plus64.exe -m 2500 HackME-01.hccap rockyou.txt
Hashcat command with rules applied.
Code:cudaHashcat-plus64.exe -m 2500 -r "C:\HashCat\oclHashcat-plus-0.13\rules\toggles1.rule" HackME-01.hccap rockyou.txt