![]() |
[oclhashcat+] wpa/wpa2 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html) +--- Forum: Feature Requests (https://hashcat.net/forum/forum-7.html) +--- Thread: [oclhashcat+] wpa/wpa2 (/thread-311.html) |
RE: [oclhashcat+] wpa/wpa2 - mastercracker - 09-03-2011 Hi. Just a quick check. I think that I have read somewhere that for WPA/WPA2, the password cannot be less than 8 characters. If that's correct, are the dictionary words smaller than 8 characters automatically skipped by OCLhashcat-plus? RE: [oclhashcat+] wpa/wpa2 - Rolf - 09-03-2011 Yes! RE: [oclhashcat+] wpa/wpa2 - HRob1n - 09-03-2011 Atom this is great news! I cant wait to try this out and make an updated write up just for cracking wpa. Do future plans include the ability to allow user to point the GUI towards the aircrack files to possible run the hcap conversions for you locally as well? That would be pretty cool add on for down the road. Thanks again. H.R. RE: [oclhashcat+] wpa/wpa2 - atom - 09-03-2011 welcome HRob1n to hashcat world ![]() optionally i've updated http://hashcat.net/cap2hccap/ with a link to the patch files for aircrack-ng for local convert. RE: [oclhashcat+] wpa/wpa2 - ati6990 - 09-03-2011 The newest Beta run as fast as hell overlocked from 880 Mhz to 930 Mhz [s]tatus [p]ause [r]esume [q]uit => s Status.......: Running Input.Mode...: File (BIG-WPA-LIST-2) Hash.Target..: SHOP Hash.Type....: WPA/WPA2 Time.Running.: 2 mins, 0 secs Time.Left....: 5 mins, 20 secs Time.Util....: 120018ms/3232ms Real/CPU, 2.8% idle Speed........: 187.6k c/s Real, 193.3k c/s GPU Recovered....: 0/1 Digests, 0/1 Salts Progress.....: 22511627/82522735 (27.28%) done, 11/22511627 (0.00%) reject HW.Monitor.#1: 95% GPU, 74c Temp HW.Monitor.#2: 95% GPU, 75c Temp RE: [oclhashcat+] wpa/wpa2 - HRob1n - 09-05-2011 Big thanks for a link to the patch...been looking non stop for it since I read this! RE: [oclhashcat+] wpa/wpa2 - rurapenthe - 09-05-2011 Very nice, I like it. However I'm getting length errors reading the hccap file generated by the patched aircrack-ng - and oclhashcat-plus64 shows some of the line which is just junk. Any ideas what causes this? Have i missed a post on it? [EDIT] nvm, think i know whats wrong. this is not released yet it is? ![]() RE: [oclhashcat+] wpa/wpa2 - atom - 09-05-2011 yeah, right! some of the long-time member do have access to the beta section. on there is a plus version with wpa/wpa2 support. i guess i will release new beta with wpa/wpa2 supports this weekend if nothing comes in between (major bugs, ...) RE: [oclhashcat+] wpa/wpa2 - rurapenthe - 09-05-2011 Awesome bro thanks. and i will gladly supply you with coffee and cookies! ![]() RE: [oclhashcat+] wpa/wpa2 - forumhero - 09-06-2011 this is awesome news! |