Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Brute forcing WPA2 becoming impossible?
Post: Brute forcing WPA2 becoming impossible?
Just a general observation that it seems it's not really possible to brute force WPA2 anymore as manufacturers are putting longer more complex passwords on their devices as standard.
Take SKY for e... |
|
Idle_Wild |
General Talk
|
7 |
3,439 |
03-07-2024, 01:17 PM |
|
|
Thread: Mask Attack
Post: RE: Mask Attack
Did some back of the envelope calculations on the improvement in processing time:
21^6 * 7^2 = 4,202,539,929 hashes / 1MH/s = 4,202.539,929 seconds / 60^2 = 1.167 hours. 8C2 = 28 rows * 1.167 = 32.67... |
|
Idle_Wild |
hashcat
|
4 |
1,241 |
03-06-2024, 01:58 AM |
|
|
Thread: Mask Attack
Post: RE: Mask Attack
Wow, that was really worth while. So if the theory is correct and there are at least 2 numbers.
The result is a mask file with 247 lines (after removing the 9 which you kindly pointed out would be... |
|
Idle_Wild |
hashcat
|
4 |
1,241 |
03-06-2024, 01:19 AM |
|
|
Thread: Mask Attack
Post: RE: Mask Attack
Thank you very much for the detailed response, I will give it a try. |
|
Idle_Wild |
hashcat
|
4 |
1,241 |
03-06-2024, 12:46 AM |
|
|
Thread: Mask Attack
Post: Mask Attack
Hi there,
I'm attempting to use the mask attack with a custom charset which is:
346789ABCDEFGHJKMNPQRTUVWXY
?1?1?1?1?1?1?1?1 [8]
I'm getting around 1MH/s on my hardware and a prediction of 4 days ... |
|
Idle_Wild |
hashcat
|
4 |
1,241 |
03-04-2024, 01:50 PM |