Is this WPA2 Password uncrackable? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Is this WPA2 Password uncrackable? (/thread-6650.html) Pages:
1
2
|
Is this WPA2 Password uncrackable? - hashbandit - 06-19-2017 here is the command line: hashcat64.exe -m 2500 -a3 davehash.hccapx -1 0123456789abcdefghijklmnopqrstuvqxyzABCDEFGHIJKLMNOPQRSTUVWXYZ ?1?1?1?1?1?1?1?1?1?1?1?1 I receive this error: The wordlist or mask that you are using is too small. This means that hashcat cannot use the full parallel power of your device(s). Unless you supply more work, your cracking speed will drop. For tips on supplying more work, see: https://hashcat.net/faq/morework Approaching final keyspace - workload adjusted. # I know that password is from a-z,0-9 ,A-Z and 12 characters long. Is this just too many charterers? I am new to hashcat, so please be gentle with terminology and abbreviations please. Thank you RE: Is this WPA2 Password uncrackable? - epixoip - 06-19-2017 It's not an error, it's purely informational. You can also shorten your command line up quite a bit by using -1 ?d?l?u instead of manually listing out all of the characters in the character set. RE: Is this WPA2 Password uncrackable? - hashbandit - 06-19-2017 (06-19-2017, 10:15 PM)epixoip Wrote: It's not an error, it's purely informational. So is it uncrackable then? I do not understand what it is telling me . Too many characters in length or too many characters to choose from? Can you explain this also "?d?l?u" ?d=0-9 ?u=A-Z ?l=a-z :: But how do i use this in the command? How do i specify the length of the password? Can you shorten the command I wrote as an example please. thank you for the fast reply RE: Is this WPA2 Password uncrackable? - Mem5 - 06-19-2017 It means : Code: hashcat64.exe -m 2500 -1 ?d?u?l davehash.hccapx ?1?1?1?1?1?1?1?1?1?1?1?1 RE: Is this WPA2 Password uncrackable? - hashbandit - 06-19-2017 (06-19-2017, 10:48 PM)Mem5 Wrote: It means : But is it possible to crack a 12 character password? What is the issue with this command. What command do I need to use? What am i doing wrong etc can you please help me. Thanks for the reply RE: Is this WPA2 Password uncrackable? - DaKahuna - 06-20-2017 Yes, it is possible to crack a 12 character password. It's just a matter of how long it will take your system to do it. What error message do you get when you enter that command " hashcat64.exe -m 2500 -1 ?d?u?l davehash.hccapx ?1?1?1?1?1?1?1?1?1?1?1?1 " Google for the error message. RE: Is this WPA2 Password uncrackable? - DaKahuna - 06-20-2017 Just to give you an idea -- my system running dual NVIDIA GTX1070's on a 10 WPA/WPA2 hash shows that it will take 46696 years and that's only brute forcing 10 characters versus your 12. [s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit => s Session..........: hashcat Status...........: Running Hash.Type........: WPA/WPA2 Hash.Target......: <Redacted> Time.Started.....: Mon Jun 19 19:32:01 2017 (1 min, 2 secs) Time.Estimated...: Thu Aug 20 05:19:43 2020 (46696 years, 52 days) Guess.Mask.......: ?1?1?1?1?1?1?1?1?1?1 [10] Guess.Charset....: -1 ?u?l?d, -2 Undefined, -3 Undefined, -4 Undefined Guess.Queue......: 1/1 (100.00%) Speed.Dev.#2.....: 289.2 kH/s (12.48ms) Speed.Dev.#3.....: 280.4 kH/s (6.26ms) Speed.Dev.#*.....: 569.6 kH/s Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts Progress.........: 34805760/839299365868340224 (0.00%) Rejected.........: 0/34805760 (0.00%) Restore.Point....: 0/13537086546263552 (0.00%) Candidates.#2....: Warinanera -> WmYJananer Candidates.#3....: JgDelerder -> JqEginaner HWMon.Dev.#2.....: Temp: 74c Fan: 31% Util: 97% Core: 131MHz Mem:3802MHz Bus:8 HWMon.Dev.#3.....: Temp: 72c Fan: 27% Util: 95% Core: 131MHz Mem:3802MHz Bus:8 RE: Is this WPA2 Password uncrackable? - epixoip - 06-20-2017 Sorry I didn't realize the length of your mask was 12 bytes long. Hashcat stores keyspace as a uint64 and 62^12 is greater than 2^64-1, hence it is causing an integer overflow, and that's why Hashcat thinks the keyspace is too small. An integer overflow check was added a few months back, so you must be using an old version. RE: Is this WPA2 Password uncrackable? - hashbandit - 06-20-2017 (06-20-2017, 01:59 AM)epixoip Wrote: Sorry I didn't realize the length of your mask was 12 bytes long. Hashcat stores keyspace as a uint64 and 62^12 is greater than 2^64-1, hence it is causing an integer overflow, and that's why Hashcat thinks the keyspace is too small. An integer overflow check was added a few months back, so you must be using an old version. I am using Hashcat 3.6.0. Is there a way around this? Thanks for the reply. RE: Is this WPA2 Password uncrackable? - Mem5 - 06-20-2017 Your problem is not about the lenght of mask, but "Time.Estimated...: Thu Aug 20 05:19:43 2020 (46696 years, 52 days)" Cracking WPA is slow. If you ask for 12 chars (lower-upper-digits) it will take 46696 years => good luck. Solution ? Buy more graphic cards and/or reduce the mask. |