hashcat Forum
mask brute force - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: mask brute force (/thread-11978.html)



mask brute force - julianhey - 05-14-2024

Hello, 

I want to know what is the instance on Amazon aws for crack the wpa2 key 22000 ? 
i want to test this one  : hashcat.exe -m 22000 -a 3  handshake.hc22000 a?a?a?a?a?a?a?a?
or the command for only a-z and 0-9. How long it takes ? thanks.


RE: mask brute force - DanielG - 05-14-2024

?a?a?a?a?a?a?a?a = 6634204312890625 passwords to test.
Hash-Mode 22000 (WPA-PBKDF2-PMKID+EAPOL) [Iterations: 4095] on AWS g5.12xlarge (4 GPU's, $5.672 per hour) runs at roughly 4000 kilo hashes per second

Meaning on AWS g5.12xlarge it will take about 53 years to complete.

Only a-z and 0-9 (?d?l) for 8 characters is 2821109907456 passwords to test. This would only take only 8 days and cost around 1 million dollars.


RE: mask brute force - slyexe - 05-15-2024

Damn only a 1-million payout in 8 days? I should be renting my equipment, I'd be rich!

Eitherway, testing only a-z and 0-9 would require creating a custom character list by using -1 and applying its parameters for lowercase and digits.

So your attack would essentially be:

Code:
hashcat.exe -m 22000 -a 3 -1 l?d? handshake.hc22000 1?1?1?1?1?1?1?1?

As for the logic behind trying a bruteforce of 8 is kind of beyond my knowledge unless you know something I don't. Seems like a waste of time to me.


RE: mask brute force - julianhey - 05-16-2024

@DanielG so you think it's impossible to bruteforce a wpa2 key ?

@slyexe with this command : hashcat.exe -m 22000 -a 3 -1 l?d? handshake.hc22000 1?1?1?1?1?1?1?1?
How long it's take with AWS g5.12xlarge ?
thanks.