Not sure about the stats WPA/WPA2 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: Not sure about the stats WPA/WPA2 (/thread-3137.html) |
Not sure about the stats WPA/WPA2 - handmadebots - 02-13-2014 Ok, so I've heard a lot of good things about hashcat, so I wanted to give it a try. I got a 4-way handshake, I've made it in the final version *.hccap I have a pretty new laptop, i7, NVIDIA GeForce 740 2GB, etc Now... I have a wordlist, and I am using this command (windows 8) to try a dictionary attack: Quote:cudaHashcat64.exe -m 2500 -u 4096 c:\Hacking\wireless\tp-link.hccap c:\Hacking\cracking\wordlist\Romanian.dic and I get the following results Quote:Hashes: 1 total, 1 unique salts, 1 unique digests This means that 16513 passwords are tried per second ? It's pretty good, in comparation to aircrack, even though I've seen some youtube videos, where the speed was 70k (almost the same GPU card), and it's real big difference. This was the dictionary attack. Trying it with mp64, I get better results, but I am not sure if I understand correctly, anyway, here is the bruteforce attack with 6 letters: Quote:mp64.exe ?l?l?l?l?l?l | cudaHashcat64.exe -m 2500 c:\Hacking\wireless\tp-link.hccap I get this results: Quote:Hashes: 1 total, 1 unique salts, 1 unique digests From this stats, I understand that 308915776 were processed in ... 1 minute and 10 seconds ?! It's a really big difference from dictionary to bruteforce. Did I get it wrong or... I am way to far from the truth ? RE: Not sure about the stats WPA/WPA2 - coolbry95 - 02-13-2014 Instead of using the mask processor for the brute force use cudahashcat. So it would be Code: cudaHashcat64.exe -m 2500 -a 3 c:\Hacking\wireless\tp-link.hccap ?l?l?l?l?l?l?l?l Running it from stdin will be a lot slower. Also if you didn't know WPA has a minimum length of 8 and a maximum length of 64. So your command that you have shouldn't even crack anything RE: Not sure about the stats WPA/WPA2 - mastercracker - 02-13-2014 All the values from stdin were rejected before getting processed for the WPA algo because they were less than 8 characters. That's why it might look faster but it won't be faster than using the -a 3 like coolbry95 mentioned. |