hashcat Forum
Cracking progress ( lass pass attempt) - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Cracking progress ( lass pass attempt) (/thread-5893.html)



Cracking progress ( lass pass attempt) - eukurs - 09-23-2016

Hello,

Im using the following cmd to trying find the pass but when i  Ctrl+c i really want to know the last attempted pass for various reasons(Like using more the 1 Pc, restores if some thing go wrong, etc).

mp64 -1 0123456789ABCDEF -s 00753E0000 ?1?1?1?1?1?1?1?1?1?1 | hashcat -m 2500 T2.hccap

Can someone help me Big Grin  ?

Thanks in advance


RE: Cracking progress ( lass pass attempt) - kiara - 09-23-2016

can u write again ur question? i did not understand a thing Smile


RE: Cracking progress ( lass pass attempt) - rico - 09-23-2016

Why are you using mask processor? hashcat can do all this.

hashcat32 -m 2500 -a 3 -1 ?dABCDEF T2.hccap ?1?1?1?1?1?1?1?1?1?1

It's going to take a while though....


RE: Cracking progress ( lass pass attempt) - eukurs - 09-23-2016

1 - Tks for our reply Rico.
And how do i inform to start at 00753E0000?


2 - Tks for our reply kiara
In aircrack-ng you can see the "Current passphrase".
I want to know if hashcat was similar feature or if has a way to see (after i cancel the cracking process) where did it stopped.


RE: Cracking progress ( lass pass attempt) - rico - 09-24-2016

1. Determine total keyspace.

>hashcat64 -m 2500 -a 3 --keyspace -1 ?dABCDEF T2.hccap ?1?1?1?1?1?1?1?1?1?1
68719476736

2. What position is 00753E0000 in the total keyspace, as a ratio? As this value is clearly hexadecimal, convert to decimal for simplicity: 1966997504

Calcs: (1966997504 / 16^10 ) = 0.00178897 (Ooo, barely started)

keyspace * completion ratio already covered:

68719476736 * 0.00178897 = 122937082.296

>hashcat64 -m 2500 -a 3 --skip 122937082 --markov-disable -1 ?dABCDEF T2.hccap ?1?1?1?1?1?1?1?1?1?1

Maybe --skip should be -s if using an older version of hashcat.

Code:
Session.Name...: hashcat
Status.........: Running
Input.Mode.....: Mask (?1?1?1?1?1?1?1?1?1?1) [10]
Custom.Chars...: -1 ?dABCDEF, -2 Undefined, -3 Undefined, -4 Undefined
Hash.Target....: Test (80:bb:bb:1e:aa:bb <-> 50:bb:bb:79:bb:9b)
Hash.Type......: WPA/WPA2
Time.Started...: Fri Sep 23 23:24:09 2016 (7 secs)
Time.Estimated.: Fri Mar 23 07:17:00 2018 (1 year, 180 days)
Speed.Dev.#1...:    23293 H/s (12.01ms)
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: [b]1967139232/1099511627776 (0.18%)[/b]
Rejected.......: 0/1967139232 (0.00%)
Restore.Point..: [b]122937082/68719476736 (0.18%)[/b]
HWMon.Dev.#1...: Temp: 42c Fan: 43%

[s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit =>

I hope you've better hardware than this Smile


EDIT: Crap, forgot you'll need the --markov-disable switch so keys are generated the same way Maskprocessor does. Otherwise the ordering of generated keys is governed by, um, Markov Chains. Just turn that bit off.


RE: Cracking progress ( lass pass attempt) - eukurs - 09-24-2016

Thank you man!!!!!! I gonna try this Big Grin!