Hello everyone,
I've been having difficulty attacking my WPA2 hash with this line:
...and getting this errror:
If you specify a custom charset, you must also specify a mask.
Any ideas as to what I'm doing wrong? Isn't the mask at the end in proper format? I searched online for similar questions people might've already asked but couldn't come up with anything.
INFO: I'm running Hashcat on a 64-bit Windows 10 machine. I have confirmed beforehand that both Hashcat is running when run with simpler options, and that my WPA2 handshake capture file contains a valid handshake.
I apologize in advance for taking anyone's time and polluting the forum if this is a rookie question.
I've been having difficulty attacking my WPA2 hash with this line:
Code:
hashcat64.exe --status --outfile WPA_out.txt --outfile-format 2 -m 2500 --custom-charset1 0123456789qwertyuıopüasdfghjklşizxcvbnmçö./!+@#$%*():; --increment --increment-min=8 --increment-max=16 wpa.hccapx -a 3 ?1?1?1?1?1?1?1?1
...and getting this errror:
If you specify a custom charset, you must also specify a mask.
Any ideas as to what I'm doing wrong? Isn't the mask at the end in proper format? I searched online for similar questions people might've already asked but couldn't come up with anything.
INFO: I'm running Hashcat on a 64-bit Windows 10 machine. I have confirmed beforehand that both Hashcat is running when run with simpler options, and that my WPA2 handshake capture file contains a valid handshake.
I apologize in advance for taking anyone's time and polluting the forum if this is a rookie question.