mask brute force - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: mask brute force (/thread-11978.html) |
mask brute force - julianhey - 05-14-2024 Hello, I want to know what is the instance on Amazon aws for crack the wpa2 key 22000 ? i want to test this one : hashcat.exe -m 22000 -a 3 handshake.hc22000 a?a?a?a?a?a?a?a? or the command for only a-z and 0-9. How long it takes ? thanks. RE: mask brute force - DanielG - 05-14-2024 ?a?a?a?a?a?a?a?a = 6634204312890625 passwords to test. Hash-Mode 22000 (WPA-PBKDF2-PMKID+EAPOL) [Iterations: 4095] on AWS g5.12xlarge (4 GPU's, $5.672 per hour) runs at roughly 4000 kilo hashes per second Meaning on AWS g5.12xlarge it will take about 53 years to complete. Only a-z and 0-9 (?d?l) for 8 characters is 2821109907456 passwords to test. This would only take only 8 days and cost around 1 million dollars. RE: mask brute force - slyexe - 05-15-2024 Damn only a 1-million payout in 8 days? I should be renting my equipment, I'd be rich! Eitherway, testing only a-z and 0-9 would require creating a custom character list by using -1 and applying its parameters for lowercase and digits. So your attack would essentially be: Code: hashcat.exe -m 22000 -a 3 -1 l?d? handshake.hc22000 1?1?1?1?1?1?1?1? As for the logic behind trying a bruteforce of 8 is kind of beyond my knowledge unless you know something I don't. Seems like a waste of time to me. RE: mask brute force - julianhey - 05-16-2024 @DanielG so you think it's impossible to bruteforce a wpa2 key ? @slyexe with this command : hashcat.exe -m 22000 -a 3 -1 l?d? handshake.hc22000 1?1?1?1?1?1?1?1? How long it's take with AWS g5.12xlarge ? thanks. |