Cracking Multiple wpa2 hashes - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Cracking Multiple wpa2 hashes (/thread-11003.html) |
Cracking Multiple wpa2 hashes - Toroloco - 09-05-2022 Hi, I’d like to know if I can crack multiple wpa2 hashes at the same time with a single command, like this: Code: hashcat -m 22000 hash.hc22000 -1 ?l?d?u? -a 3 ?1?1?1?1?1?1?1?1?1?1 The file after a conversion Code: version (pcapng).........................: 1.0 So do I have to edit the hc22000 file to isolate the mac I’m trying to crack each time I use it ? Would that be a good approach or it would take longer to recover the password? If it takes the same amount of time I could try to recover the password for the whole file, instead of just one single MAC address. I would appreciate any input RE: Cracking Multiple wpa2 hashes - slyexe - 09-06-2022 Code: ESSID (total unique).....................: 73 This would state there was 73 different routers detected however it doesn't determine how many devices you received a PMKID or handshake with. So if there is a specific device you're wanting to attack you'll have to isolate it from the capture and place it in its own text file. This can all be done by simply opening the hc2200 file with your favourite text editor. When you attack multicapture file you'll see that the attack will list the amount of digest and salts. Digest relate to the device which properly submitted the hash and the salt are the total different hashes. So you could have 100 digest and 1 salt and that would mean finding the password for 1 digest would reveal for the other 99 digest. CUDA API (CUDA 11.7) ==================== * Device #1: NVIDIA GeForce RTX 3090, 23336/24575 MB, 82MCU * Device #2: NVIDIA GeForce RTX 3090, 23336/24575 MB, 82MCU * Device #3: NVIDIA GeForce RTX 3090, 23336/24575 MB, 82MCU * Device #4: NVIDIA GeForce RTX 3090, 23336/24575 MB, 82MCU Minimum password length supported by kernel: 8 Maximum password length supported by kernel: 63 Hashes: 36 digests; 36 unique digests, 9 unique salts So if you have several salts that would become your ratio for the time of the attack. So if you have 100kh/s and 1 salt takes 100 seconds, adding a 2nd salt would increase your time to 200 seconds and so forth. RE: Cracking Multiple wpa2 hashes - Toroloco - 09-07-2022 That was the best explanation! Thank you so much..! And one last thing, is there a way to check if the hash has a valid handshake? I’m guessing that If I’m able to isolate the MAC address of that particular router then it should work. (I’m guessing that because I was trying to attack a particular router but I couldn’t find the MAC address in the hc22000 file) Thanks again, I really appreciate your help. RE: Cracking Multiple wpa2 hashes - slyexe - 09-07-2022 Anything parsed by hcxpcapngtool is validated in the process. If the packets does not contain the right data it will void it as a hash and you will not be able to use it. RE: Cracking Multiple wpa2 hashes - ZerBea - 09-07-2022 "I’m guessing that because I was trying to attack a particular router but I couldn’t find the MAC address in the hc22000 file" That is always the case if hcxdumptool successfully attacked a CLIENT. In that case, mostly a random generated MAC_AP is used by hcxdumptool. If that happened just look for the ESSID and the MAC_CLIENT. |