hashcat Forum
Hashcat Plus Benchmark Command - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html)
+--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html)
+--- Thread: Hashcat Plus Benchmark Command (/thread-2139.html)



Hashcat Plus Benchmark Command - Zündapp - 03-13-2013

Good Morning,

yesterday was my frist test to crack a numeric WPA hash.
Hashcat is very nice tool Smile. My System is a Intel Xeon with 3,0GHz and a Quadro FX1800. While hashing the speed was 3500k/s. Now my question...
Is there a command to test the speed to crack a WPA hash without a WPA-Handshake file? I was wondering, because cracking my hash tooks only 45 minutes. The planned duration was 9 hours sayed hashcat. My key is 8 digits long and begins with 53xxxxxx. I had no wordlist, i tried the mask attack (cudaHashcat-plus64.exe -m 2500 -a 3 capture.hccap ?d?d?d?d?d?d?d?d).

My greetings
Zünadpp


RE: Hashcat Plus Benchmark Command - epixoip - 03-13-2013

you need an hccap file to benchmark, no way around that.

the ETA is how long it will take to exhaust the entire keyspace at the current speed. it does not mean it will take that long to crack the hash, nor does it guarantee the hash will be found within that timeframe. it's just a simple "charset^length / speed" equation.

if you want an official benchmark, use http://bindshell.nl/pub/hashcat-benchmark.sh

with this script, the hccap needs to be named 'test.hccap'


RE: Hashcat Plus Benchmark Command - Zündapp - 03-13-2013

Thank you for that fast reply.
For WPA2 Hash cracking i have to use Hashcat-Plus or can I also choose Hashcat-Lite?

Thank you
Greetings
Zündapp


RE: Hashcat Plus Benchmark Command - atom - 03-13-2013

No that is because oclHashcat-lite was written for competition. WPA/WPA2 is a slow algorithm and IMO slow algorithms cant be used for competition. There is no challenge in making them as fast as theoretical possible.


RE: Hashcat Plus Benchmark Command - Zündapp - 03-13-2013

Ok, thank you!
What is the best method to crack the WPA-Key in my case?
Use the mask attack or create a wordlist (e.g. Crunch) with the same content of charset. I thought the advantage of the mask attack is that there is no wordlist which needs disk space, because when there are more than 8 digits the wordlist will increase to a very big file. Is that correct? Which method is faster? Wordlist or Mask Attack?

Thank you Smile

Zündapp


RE: Hashcat Plus Benchmark Command - epixoip - 03-13-2013

mask attack is usually faster, but for a slow algorithm like wpa it may not matter. but like you said mask attack also will not use any disk space.


RE: Hashcat Plus Benchmark Command - Zündapp - 03-14-2013

Thank you!

@epixoip

Good morning,

how can i run a Shell script under Windows.
I use hashcat with Windows 7.

Best regards

Zündapp


RE: Hashcat Plus Benchmark Command - epixoip - 03-14-2013

if you have bash installed under cygwin it may run, i don't know.

maybe someone can port it to a .bat script or powershell script.


RE: Hashcat Plus Benchmark Command - Hash-IT - 03-16-2013

(03-13-2013, 11:08 AM)atom Wrote: WPA/WPA2 is a slow algorithm and IMO slow algorithms cant be used for competition. There is no challenge in making them as fast as theoretical possible.

Hmm...

Have I understood this correctly ?

To me this reads as if you have not really tried to optimise WPA cracking. If so, that is quite remarkable considering oclhashcat-plus is the fastest WPA cracker ! Smile

I find this hard to even write but does this mean you could possibly improve oclhashcat-plus WPA speed if you really felt like it ?

Surly you must have reached the limitations of any software reaching these speeds, it must be down to hardware now ?


RE: Hashcat Plus Benchmark Command - atom - 03-18-2013

No I am happy with the grade of optimization done in WPA/WPA2. What I was saying is that there are other hash algorithms that are easier to compute and therefore its harder to reach maximum speed.