When you bring pipes and aircrack-ng into the equation there are other more important considerations.
There are two major constraints to brute forcing a WPA key using aircrack-ng or pyrit.
The first is speed. If you use a passthru you dramatically slow the cracking speed down as the computer must precompute the word. So it is better to precompute the dictionary files and divide the files up into smaller blocks.
The second is the time required. Many of these attacks take weeks if not months. You cannot expect to run your computer constantly for that length of time, you will eventually need to stop the attack. The problem then is how to restart where you left off.
If you precompute your dictionaries, you can use John the Ripper in a pipe to save your work.
Begin the crack by adding the following after john
The allrules is just the name you give to the file saved by john
john --session=allrules --wordlist=/root/wordlist.txt --rules:modified_single --stdout | aircrack-ng -e "ESSID" -w - /root/NAME.cap
When you want to stop hit Ctrl-C and wait
To restart enter
john --restore=allrules | aircrack-ng -e "ESSID" -w - /root/NAME.cap
The attack proceeds from the shutdown point.
You should only use a passthru if the attack will be short in duration or the wordlist file is so big that you cannot store it. Here crunch is a good solution as it allows the restarting where the attack stopped.
Although this is a linux forum we cannot help but note that the real brute force WPA cracking tool is Elcomsoft/Windows8 and two(2) GPU's but we will leave that for another forum.
Thanks to Both @Musket and @repzeroworld... i Got It Now...
So, I'm reviving an old thread but, is it possible to limit the amount of (say A-F) characters in each "word" and have the rest filled with numbers?
I would like to generate possible keys 10 characters long but limit A-F to at most 5 characters and minimum of 1
i am researching the security if an ISP supplied router in my country and i have thus far determined the network keys for them are 10 characters long and use capital A-F and 0-9, and from the small amount of network keys i already have, i have also determined that letters are less frequent than numbers (i have no network keys with more than 4 letters or less than 2)
Thanks for the help
Last edited by St0ner1995; 2016-11-14 at 12:50 AM. Reason: spelling correction
You could try Hashcat St0ner1995:
Code:hashcat -m 2500 -a3 myfile.hccap -1 ?dABCDEF ?1?1?1?1?1?1?1?1?1?1
***REBORN OF THE ADSTAR PROGRAM****
@St0ner199 and public
I have re-written the program to include several options. You may be amazed of what you can do with the program now. I think also what you want to do is included in the docs.
There are two versions of the program
1. The Command Line - Written in python and ported to C with python's interpretor for debugging purposes
2. The GUI version
a. Written in python - Back end
I leave the link below to get documentation and download of the program. Note too read the docs carefully.
I tried to iron out all bugs but do report bugs in the "contact section" of the site
Please note:certain sections of my website is still not up as yet due to data loss...
Last edited by repzeroworld; 2016-12-18 at 10:23 PM.
Bugs reported by "Kearns"... program now recompiled to work successfully...presently working on windows version of the GUI for fun....
Any chance of a 32 bit version?