I have the hash of a Technicolour router, as I understand it the default password is a 10 char Hex key.
If I run a straight bruteforce over the entire keyspace
The time to complete is 120 dqays on my system so obviously I'd like to reduce the keyspace where possible.
I have successfully started running 10-Hex-Generator but I can't pause or restore the session which makes it unpractical as I like to use my system during the day and resume Hashcat over night.
I would like to try running Maskprocessor can anyone please help with the code to pipe the 10 char hex maskprocessor output through Hashcat?
As always thanks.
If I run a straight bruteforce over the entire keyspace
Code:
'/home/user/Hashcat-beta/hashcat-5.1.0/hashcat.bin' -m 2500 -a 3 '/home/user/Documents/1cap.hccapx' ?H?H?H?H?H?H?H?H?H?H
I have successfully started running 10-Hex-Generator but I can't pause or restore the session which makes it unpractical as I like to use my system during the day and resume Hashcat over night.
I would like to try running Maskprocessor can anyone please help with the code to pipe the 10 char hex maskprocessor output through Hashcat?
As always thanks.
Last edited: