o c/s using oclhashcat plus 0.09 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html) +--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html) +--- Thread: o c/s using oclhashcat plus 0.09 (/thread-1677.html) |
o c/s using oclhashcat plus 0.09 - snooz - 10-22-2012 I am using a HD 5870 card on Windows 7 64 bit using Catalyst 12.8. I am testing this on a WPA handshake I captured in airodump and converted to hccap using cap2hccap. I get the following output... Quote:C:\Users\snooz\Desktop\oclHashcat-plus-0.09>oclHashcat-plus64.exe -m 2500 test.hcc I suspect I've done something wrong because I keep getting 0 c/s and less than 50% utility of my GPU; sometimes the GPU will be at 0%. Is my command line missing something? Thanks. RE: o c/s using oclhashcat plus 0.09 - M@LIK - 10-22-2012 Yes, it's missing a dict. RE: o c/s using oclhashcat plus 0.09 - snooz - 10-22-2012 (10-22-2012, 12:08 AM)M@LIK Wrote: Yes, it's missing a dict. Ah okay, so a dict is required? Thanks. RE: o c/s using oclhashcat plus 0.09 - epixoip - 10-22-2012 it does if you don't specify an attack mode. please read the output of ''oclHashcat-plus64.exe -h'' and then consult the wiki if you still do not understand. RE: o c/s using oclhashcat plus 0.09 - NeonFlash - 10-27-2012 In order to crack a WPA/WPA2 handshake, you need to have a dictionary and that is probably the only mode of attack which can give you success. So, to complete your syntax: oclHashcat-plus64.exe -m 2500 -a 0 test.hcc dict.txt where, dict.txt is your wordlist. |