Rule based attack
Use a wordlist and best64 rules to try and crack a wordpress hash. Using rockyou.txt as an example.
-m Specifies the hash type
hashcat -m 400 wordpress.hash -r rules/best64.rule wordlist/rockyou.txt
wordpress.hash is a text file that contains the password hash. You can list multiple hashes in the file
Example contents of file
bob@localhost:~$ cat wordpress.hash
$P$BeJ2ZWVgSx/rR8ifcTFyjq1ouCCWwu0
bob@localhost:~$
Brute force
Attempt every 8 numeric combination for a WPA2 key.
hashcat -m 2500 -a3 capture.hccapx ?d?d?d?d?d?d?d?d
Hashcat built in Charsets
You can swap out the ?d from the above command with any of the built in character sets below.
? | Charset ===+========= l | abcdefghijklmnopqrstuvwxyz u | ABCDEFGHIJKLMNOPQRSTUVWXYZ d | 0123456789 h | 0123456789abcdef H | 0123456789ABCDEF s | !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~ a | ?l?u?d?s b | 0x00 - 0xff
More information
https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2
Rule based attacks are recommended
https://hashcat.net/wiki/doku.php?id=rule_based_attack