Navigate to your Hashcat folder where its unzipped.
To specify device use the -d argument and raving the number of your GPU.Step 3: Crack the Capture File with oclHahscat.You can use the custom mask super option?d?d?d?d?d?d?d?d Note- For a mask/Brute-force options you will need to use the -a windows 3 switch.The oclHashcat site has a page load you can upload upto 5mb p files and then download the back file clsid back.hccap.Type hashcat32.exe or hashcat64.exe siemens depending on the architecture of your CPU.WPA2 ccmp PSK HH2 78:71:9C:99:67:D.In these next steps we will make manual use of oclhashcat/hashcat to crack the WPA/WPA2 handshake.Test 3 : Kali installed as a virtual patch machine, in this case it would games take 11 hours, 31 minutes and 40 seconds to try all windows passwords in the wordlist!See here for more info.).We capture this handshake by directing airmon-ng to monitor traffic on the target network using clsid the channel and bssid values discovered from the previous from command.Txt of compile wordlist/or hashes of the same type and pipe full that into the command.Installing using Hashcat, first you need to download Hashcat from t/hashcat navigate to the location where you downloaded it, and unzip it, personally I like to use 7zip. Example: hashcat64.exe -m 2500 -d 3 Handshake.
Mon0CH 6 Elapsed: 0723 16:09 bssid PWR RXQ Beacons #Data, s CH MB ENC cipher auth essid 9C:5C:8E:C9:AB:C e WPA2 ccmp PSK asus Now we wait Once youve captured a handshake, you should see something like WPA handshake: bc:d3:c9:ef:d2:67 at the top right of the.
Hccapx Next, download and run naive-hashcat: # download git clone m/brannondorsey/naive-hashcat cd naive-hashcat# download the 134MB rockyou dictionary from file curl -L -o dicts/rockyou.