Quantcast
Channel: hashcat Forum - All Forums
Viewing all articles
Browse latest Browse all 7675

Avoid character occurrance in brute force attack

$
0
0
Hi, I'm trying to brute forcing my wpa's captured .cap file and, in order to boost the process 
I though to set some "filters" to the hashcat process, letting it jump the charset combination with 2 or more 
sequential occurrance of the same character.

Since I know my password is a ten digit password with no sequential occurrance of the same number,
hashcat should process something like:
1010101010
1231231231 
....

but NOT something like:
1101100100
1122333123
....

Now, the basic command for a brute force attack, i think it should be: 
m 2500 -a3 capture.hccapx ?d?d?d?d?d?d?d?d  

How do I get, in this command, a "rule" for filtering and deleting combination 
with sequential occurrance of the same number?

Thanks for your help, sorry if something's wrong, but I'm not an expert and these are my first steps with hashcat

P.S. I know is possible to get hashcat works with gpu for boosting process, but my gpu is too old

Viewing all articles
Browse latest Browse all 7675

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>