Brute forcing 5-12 character WPA in practice ? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: General Help (https://hashcat.net/forum/forum-8.html) +--- Thread: Brute forcing 5-12 character WPA in practice ? (/thread-2997.html) Pages:
1
2
|
RE: Brute forcing 5-12 character WPA in practice ? - epixoip - 01-09-2014 impossible to have a 5 character WPA password, minimum length for that algorithm is 8 characters. 8x R9 290X will take an average of 2.66 years to brute force an 8-character alphanumeric password (no special characters), and over 5 years to exhaust the whole keyspace. so as you can see, brute force is largely not possible with WPA. RE: Brute forcing 5-12 character WPA in practice ? - zeroprobe - 01-09-2014 Most default passwords are not alphanumeric and in my experience, 90% of passwords given out by the ISP's are never changed by the user. You need to research what each ISP uses. Most ISP's use 8 characters lower 8 characters upper 8 characters HEX 10 characters HEX 10 characters digits I've had success with all of the above in reasonable timeframes. Below is a very good site for calculating time taken, just input your custom keys per second and calculate. http://calc.opensecurityresearch.com/ Example: 4x 290X's at 200k/s would crack 8 characters lower OR upper in 3 days max. 1.5 days average. RE: Brute forcing 5-12 character WPA in practice ? - epixoip - 01-09-2014 the notion of an ISP handing out a wifi router is rather foreign to me. is this mostly practiced in Europe? the only ISP i know that does this in the US is AT&T, with their DSL gateways which have built-in wifi. well i guess mobile hotspots also have generated numeric passwords as well. anyway, 99.9999% of the access points i encounter are purchased by their owners who have created their own passwords for these devices. but i suppose ymmv. RE: Brute forcing 5-12 character WPA in practice ? - zeroprobe - 01-09-2014 (01-09-2014, 03:07 PM)epixoip Wrote: the notion of an ISP handing out a wifi router is rather foreign to me. is this mostly practiced in Europe? the only ISP i know that does this in the US is AT&T, with their DSL gateways which have built-in wifi. well i guess mobile hotspots also have generated numeric passwords as well. anyway, 99.9999% of the access points i encounter are purchased by their owners who have created their own passwords for these devices. but i suppose ymmv. Wasn't aware of that. With the UK at least, ISP's dish out routers with pre set keys. RE: Brute forcing 5-12 character WPA in practice ? - futant - 01-10-2014 Another newb question: Is there any performance advantage (or even possible) to run oclHashcat on a Macbook pro that has an nvidia chipset as opposed to running hashcat on the cpu? In any operating system, I have osx mavericks, backtrack and win7 on this machine. RE: Brute forcing 5-12 character WPA in practice ? - futant - 01-10-2014 Scratch that last question. Until I get a mutli-GPU box purchased, I'm running hashcat on a supermicro server. Unfortunately it is in an ESXi server so I put a Linux virtual machine on it, and gave it access to all 8 cores on the machine. Currently running a dictionary attack and I'm seeing the overall server pegged hard on CPU. Input.Mode: Dict (rockyou.txt) Index.....: 4/5 (segment), 3488132 (words), 33550343 (bytes) Recovered.: 0/1 hashes, 0/1 salts Speed/sec.: 5.60k plains, 5.60k words Progress..: 2986168/3488132 (85.61%) Running...: 00:00:08:53 Estimated.: 00:00:01:29 I'm curious, is this speed very slow ? RE: Brute forcing 5-12 character WPA in practice ? - zeroprobe - 01-10-2014 Yes it is, cracking using CPU's is very slow and not worth doing. I get 420K / sec with two 7970's and a 7850. RE: Brute forcing 5-12 character WPA in practice ? - epixoip - 01-10-2014 (01-10-2014, 10:20 AM)futant Wrote: I'm curious, is this speed very slow ? it is horrendously slow. |