08-05-2013, 05:45 AM
This post is leaked from the premium section of "Legion" on the competing hack forum. There will be 5 new leaks a day. There may be some format problems due to UTF8 character encoding.
Quote:(07-10-2013, 01:23 PM)Greyhat.Infiltrator Wrote:[To see links please register here]
On my last WPA Cracking tutorial which can be found in the link below,
([To see links please register here]
)
I showed how to do a Dictionary Attack against a WPA Handshake in Windows using Hashcat.
However, this time around I will show how to use "Rules" in Hashcat to increase the chances of cracking your captured WPA key.
If you don't know what I am talking about, please spend sometime reading this Hashcat documentation to understand what "Rules" is all about.
([To see links please register here]
)
The video below will demonstrate how powerful "Rules" can be, and why you should always use it, when cracking your WPA Handshake.