Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


[Legion Leak] WPA Dictionary Attack and Hashcat Rules Part 2 filter_list
Author
Message
[Legion Leak] WPA Dictionary Attack and Hashcat Rules Part 2 #1
This post is leaked from the premium section of "Legion" on the competing hack forum. There will be 5 new leaks a day. There may be some format problems due to UTF8 character encoding.


(07-10-2013, 01:23 PM)Greyhat.Infiltrator Wrote:
[Image: ieq6viOQ6szdE.gif]

On my last WPA Cracking tutorial which can be found in the link below,

( http://www.hackforums.net/showthread.php?tid=3458431 )

I showed how to do a Dictionary Attack against a WPA Handshake in Windows using Hashcat.
However, this time around I will show how to use "Rules" in Hashcat to increase the chances of cracking your captured WPA key.


If you don't know what I am talking about, please spend sometime reading this Hashcat documentation to understand what "Rules" is all about.

( http://hashcat.net/wiki/doku.php?id=rule_based_attack )


The video below will demonstrate how powerful "Rules" can be, and why you should always use it, when cracking your WPA Handshake.



Hashcat command without rules applied.

Code:
cudaHashcat-plus64.exe -m 2500 HackME-01.hccap rockyou.txt


Hashcat command with rules applied.

Code:
cudaHashcat-plus64.exe -m 2500 -r "C:\HashCat\oclHashcat-plus-0.13\rules\toggles1.rule" HackME-01.hccap rockyou.txt
[Image: F4Z9Dqw.png]

Reply







Users browsing this thread: 1 Guest(s)