Let's directly continue the second part after knowing enough of Hashcat basics! 💪
Hashcat allows you to use the following built-in charsets to attack a WPA2/WPA handshake file and enough sniffing the air! :)
So lets assume that your password is 12345678. You can use a custom MASK like ?d?d?d?d?d?d?d?d
What it means is that you’re trying to break a 8 digit number password like 12345678 or 23456789 or 01567891.
Letter passwords – All uppercase
If your password is all letters in CAPS such as: AHUYWEFGH or JHIOP .etc. then you can use the following MASK:
It will crack all 8 Letter passwords in CAPS.
Letter passwords – All lowercase
If your password is all letters in lowercase such as: abcdefgh or aafgghpoiu .etc. then you can use the following MASK:
It will crack all 8 Letter passwords in lowercase. I hope you now know where I am getting at.
Passwords – Lowercase letters and numbers
If you know your password is similar to this: p9o8i7u6 or n4j2k5l6 etc. then you can use the following MASK:
Passwords – Uppercase letters and numbers
If you know your password is similar to this: N4J2K5L6 etc. then you can use the following MASK:
Passwords – Mixture of uppercase, lowercase, special characters and numbers.
If you password is all random, then you can just use a MASK like the following:
Note: ?a represents anything …. I hope you’re getting the idea.
If you are absolutely not sure, you can just use any of the predefined MASKs file and leave it running. But yeah, come back to check in a million years for a really long password …. Using a dictionary attack might have more success in that scenario.