


The second option (Use word delimiters) allows to set different characters (e.g. With the first option, the program will try to capitalize the first letter of each word, i.e.

Select the dictionaries in the Dictionary 1 and Dictionary 2 fields you can use the same file or different ones. This attack allows to test passwords that consist of two words, each of them taken from the dictionary (word list). In that case, the mask is going to be as follows, assuming that the custom charset containing all small letters is created if it is the only one, it will have the number the mask is properly set, you will see the Password total (the total number of passwords that fits into this mask), and Password range (first and last passwords to be checked): In order to use the last option, you should also create a custom character set each set has its own number.įor example, assuming that you password is formed as follows:

Select the name of the dictionary file, as well as the options that affect the speed and efficiency of the attack. Since the wireless encryption standard does not permit passwords outside of the 8-64 characters range, we recommend keeping this option enabled.ĭictionary attack - Password mutation options If this option is set, the program will check only those words from the wordlist that are 8 to 64 characters long and so comply with the wireless encryption standards. You can set Ignore password if it is shorter than 8 characters or longer than 64 characters. Press Add to add dictionary file(s) to the list, Remove to remove selected items, and Up/Down to reorder. This attack tries all possible variations of a given word, applying more mutations than in the dictionary attack with the "maximize efficiency" option selected. Attack settings ELCOMSOFT.COM » Elcomsoft Wireless Security Auditor
