Speeding up WPA cracking with ruleset - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Speeding up WPA cracking with ruleset (/thread-8676.html) |
Speeding up WPA cracking with ruleset - slawson - 10-01-2019 I have (2) R9-290X cards in my system, which I feel does a great job. I am getting close to 400K H/s while cracking WPA with a dictionary file. I can run through a large dictionary file in about 5 minutes. If I add the best64 ruleset, it takes about 8.5 hrs. I hope I can phrase my questions properly, but here they are: 1. I noticed that if I have two hashes in the same file to crack, it doubles the crack time. That seems logical, but is there any way to optimize that? 2. If I wanted to use the best64 ruleset, but I didn't wan't to use calculated passwords that are more than 12 characters, is there a way to do that? My thinking is that would greatly reduce the possibilities, but still be very effective. RE: Speeding up WPA cracking with ruleset - 10fi - 10-02-2019 (10-01-2019, 09:03 PM)slawson Wrote: I have (2) R9-290X cards in my system, which I feel does a great job. I am getting close to 400K H/s while cracking WPA with a dictionary file. I can run through a large dictionary file in about 5 minutes. If I add the best64 ruleset, it takes about 8.5 hrs. I hope I can phrase my questions properly, but here they are: AD1: you could use the Brain function (see release note for hashcat 5), you could edit the file to remove duplicates... |