hashcat Forum
Is this WPA2 Password uncrackable? - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Is this WPA2 Password uncrackable? (/thread-6650.html)

Pages: 1 2


RE: Is this WPA2 Password uncrackable? - atom - 06-20-2017

Wait, 62^12 = 0xE5720EE830681000 so it's close to an integer overflow but it's not overflowing. Therefore hashcat is not warning.

Cracking a random WPA password with length 12 with upper, lower and digits is not possible. But the key here is "random". If the password contains words (even scrambled) you may can crack it using a wordlist. Another possibility is if the password was not changed on the AP. In that case it just looks random, but it isn't. It then can be cracked using a keygenerator for that AP type.


RE: Is this WPA2 Password uncrackable? - epixoip - 06-20-2017

No, I don't think so.

http://www.wolframalpha.com/input/?i=is+62%5E12+greater+than+(2%5E64-1)

http://www.wolframalpha.com/input/?i=62%5E12+to+base+16 (click More under Other Data Types)

Quote:unsigned 64-bit integer | 00106830e80e72e5 (overflow: truncated to 64 bits)
unsigned 128-bit integer | 00106830e80e72e5ae00000000000000



RE: Is this WPA2 Password uncrackable? - atom - 06-20-2017

You're right! But hashcat is reporting the overflow correctly:

Integer overflow detected in keyspace of mask: ?1?1?1?1?1?1?1?1?1?1?1?1

(where -1 = ?d?l?u)


RE: Is this WPA2 Password uncrackable? - hashbandit - 06-24-2017

(06-20-2017, 10:25 AM)atom Wrote: Wait, 62^12 = 0xE5720EE830681000 so it's close to an integer overflow but it's not overflowing. Therefore hashcat is not warning.

Cracking a random WPA password with length 12 with upper, lower and digits is not possible. But the key here is "random". If the password contains words (even scrambled) you may can crack it using a wordlist. Another possibility is if the password was not changed on the AP. In that case it just looks random, but it isn't. It then can be cracked using a keygenerator for that AP type.

Interesting. Im just testing it on my home router. It has the default password on it, which is just random upper-lower-numbers. Would you have any links or resources regarding AP keygens? I'd be interested in trying it.