I am trying to figure out how long would oclhaschat take to guess my wpa2 password.
It is a combination of 2 dictionary with 2 numbers added at the end.
From reading it seems what I would need is a combination attack. The dictionary contains lowercase 3-8 character, some 14-thousand words. The second dictionary is just a copy of the first.
The command I am using is
-m 2500 -a 1 -k ?d?d d:\shake.hccap d:\dict1 d:\dict1_copy
oclHashcat exits immediately with the Rejected line being (%100), some 200 million possible combinations. What am I doing wrong?
It is a combination of 2 dictionary with 2 numbers added at the end.
From reading it seems what I would need is a combination attack. The dictionary contains lowercase 3-8 character, some 14-thousand words. The second dictionary is just a copy of the first.
The command I am using is
-m 2500 -a 1 -k ?d?d d:\shake.hccap d:\dict1 d:\dict1_copy
oclHashcat exits immediately with the Rejected line being (%100), some 200 million possible combinations. What am I doing wrong?