There is no difference between WPA hashes for attacking them? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: There is no difference between WPA hashes for attacking them? (/thread-3270.html) |
There is no difference between WPA hashes for attacking them? - SopalajoArrierez - 03-29-2014 There are several WPA protocols: WPA, WPA2, PSK, AES, TKIP... and maybe some other(s). I would like to know if all of them have the same difficulty to be cracked, or at least to be cracked using OCLHashCat. As long as I see, the command line switch just tells "WPA/WPA2". Does that mean all of these encryption protocols should be attacked the same way? Can we say that the security level of my network is (as for now) the same whenever the WPA encryption method I use? Thanks a lot. RE: There is no difference between WPA hashes for attacking them? - Milzo - 03-29-2014 WPA/WPA2 with different personal levels of encryption TKIP/AES doesn't make it anymore difficult on capturing a handshake to attack a PSK. |