05-13-2018, 03:54 AM
I'm trying to decrypt 2500 WPA2
[ANSWERED] New user, custom brute force help
|
05-13-2018, 03:54 AM
I'm trying to decrypt 2500 WPA2
05-13-2018, 04:00 AM
Not much to go on to help you here.
Please also note that you're not 'decrypting' - there is no 'reversing' or 'decrypting' of true hashes. Hashes are not encryption. When you're trying to crack a hash, you're hashing many strings until a hash matches the hash you have.
~
you won't complete that brute force attack within your lifetime with a single high end gpu.
05-14-2018, 12:07 AM
05-14-2018, 12:10 AM
(05-14-2018, 12:07 AM)cryptozin Wrote:(05-12-2018, 07:56 PM)h1430210 Wrote: For 10 digits using no numbers, uppercase letters, lowercase letters, @, #, and $, Is there a way to save the cracking progress? In case of pc crash or energy down etc? So doesn`t have to start over?
05-14-2018, 12:59 AM
Yep, that happens automatically - state is saved periodically to a restore file, and you use --restore to restore.
~
05-14-2018, 01:25 AM
|
« Next Oldest | Next Newest »
|