Last active
February 8, 2021 23:16
-
-
Save bluesku/96f5b4f4257694cc938bf6c3be578ae6 to your computer and use it in GitHub Desktop.
Brute Force Password With HashCat
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#! /bin/bash | |
printf "HASH WPA HARDERNS NEAR BY\n\n" | |
read -p "Informe Diretório do .hccapx: " hccapx | |
read -p "Informe Diretório da Wordlist: " wdlist | |
read -p "Nome da Sessão: " sessao | |
function hash_list { | |
hashcat -a 0 -m 2500 $hccapx $wdlist --session=$sessao --gpu-temp-disable --status -o cracked.txt | |
} | |
#save restore point | |
echo hashcat --restore --session=$sessao >> restore_point-hashcat.txt | |
hash_list # chamar hashcat | |
#kEEP READING: https://linuxize.com/post/bash-while-loop/ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment