WPA2 key testing - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: General Help (https://hashcat.net/forum/forum-8.html) +--- Thread: WPA2 key testing (/thread-5308.html) |
WPA2 key testing - sickpuppy - 03-03-2016 Hi, I want to check that I'm doing WPA2 properly and see how long it'll take so I've captured my own WIFI handshake, obviously I know the password - AVBXVRWA. I want to work out how long it should roughly take, how do I work out exactly how many iterations hashcat will go through to get there. I know that total combinations are 28^8, but how do I do it for that specific password? Assuming I use the mask ?u?u?u?u?u?u?u?u Thanks in advance. RE: WPA2 key testing - epixoip - 03-03-2016 Unless I missed something, you just answered your own question. RE: WPA2 key testing - rico - 03-04-2016 I think he means at what exact point would AVBXVRWA be found? If you use the --markov-disable flag with your mask for classic brute-force then it should be found at around 3.25% "Progress:". How long your hardware takes to get there only you can tell us as you haven't mentioned what you've got. Benchmarking by running hashcat with "-b -m 2500" to determine hash rate. If you don't use --markov-disable, you'll have to consult the source to see how markov chains are applied to determine when you'll get there... |