Maskprocessor Hashcat help.

snagglesdad

Member
Feedback: 0 / 0 / 0
Joined
Feb 9, 2020
Messages
17
Reaction score
1
Credits
0
I have the hash of a Technicolour router, as I understand it the default password is a 10 char Hex key.
If I run a straight bruteforce over the entire keyspace
Code:
'/home/user/Hashcat-beta/hashcat-5.1.0/hashcat.bin'  -m 2500 -a 3 '/home/user/Documents/1cap.hccapx'  ?H?H?H?H?H?H?H?H?H?H
The time to complete is 120 dqays on my system so obviously I'd like to reduce the keyspace where possible.
I have successfully started running 10-Hex-Generator but I can't pause or restore the session which makes it unpractical as I like to use my system during the day and resume Hashcat over night.
I would like to try running Maskprocessor can anyone please help with the code to pipe the 10 char hex maskprocessor output through Hashcat?

As always thanks.
 
Last edited:

snagglesdad

Member
Feedback: 0 / 0 / 0
Joined
Feb 9, 2020
Messages
17
Reaction score
1
Credits
0
I think I have progress but still need help please.
Code:
[manjaro maskprocessor-0.73]# mp64.bin  -1 ?dABCDEF ?1?1?1?1?1?1?1?1?1?1 '/home/user/Hashcat-beta/hashcat-5.1.0/hashcat.bin' -m 2500 '/home/user/Documents/1cap.hccapx'

bash: mp64.bin: command not found
 

rainykeys

Active member
Feedback: 0 / 0 / 0
Joined
Dec 30, 2019
Messages
108
Reaction score
7
Credits
145
##Example usage: 10hex | oclHashcat64 -m 2500 CAP.hccap
pipes its output into oclHashcat (AMD)

10hex | cudaHashcat64 -m 2500 CAP.hccap
pipes its output into cudaHashcat (NVIDIA)

10hex | aircrack-ng -w - CAP.cap -e SSID
pipes its output into aircrack-ng

./10hex | pyrit -r CAP.cap -i- attack_passthrough
pipes its output into pyrit

it says you can pipe it.
or do you want to run windows ?!
 

snagglesdad

Member
Feedback: 0 / 0 / 0
Joined
Feb 9, 2020
Messages
17
Reaction score
1
Credits
0
Hi, I think I have sussed what I need to do.
I'm creating a session using .
Code:
/10hex -risky | hashcat  -m 2500 --session 10hex-session cap.hccapx
I can restart the session by running
Code:
/10hex -risky | hashcat --session 10hex-session --restore

I couldn't get maskproccessor to run no matter what I tried, Thinking about it I should only need to stick with 10-Hex-Generator. Maskprocessor and straight brutefroce are pretty much the same when I'm after an unknown Hex hash... I think!

I'm obviously making this up as I go so I'm open to any and all help and advice.
Thanks
 
Top