Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: WPA2 Attack from dictionary has bug?! (Solved)
Post: RE: WPA2 Attack from dictionary has bug?! (Solved)

epixoip Wrote: (11-13-2012, 09:05 AM) -- sounds like your problems are the result of aggressive overclocking. -- Yes, sounds like... But no overclock presents! RAM also in good condition. Thank you, ...
Buran Very old oclHashcat-plus Support 8 26,942 11-14-2012, 06:14 AM
    Thread: WPA2 Attack from dictionary has bug?! (Solved)
Post: RE: WPA2 Attack from dictionary has bug?! (Solved)

Thank you, epixoip, for the help attempts! Problem solved. If the parameter --gpu-accel not equal 40, then HashCat-plus write password not found (-n > 40) or cracked with empty password (-n < 40). Pas...
Buran Very old oclHashcat-plus Support 8 26,942 11-12-2012, 02:40 PM
    Thread: WPA2 Attack from dictionary has bug?! (Solved)
Post: RE: WPA2 Attack from dictionary has bug?!

epixoip Wrote: (11-12-2012, 11:12 AM) -- i also notice you're running in stdin mode, not a straight dictionary attack -- what are you doing to your dictionary before piping it into hashcat? -- I tr...
Buran Very old oclHashcat-plus Support 8 26,942 11-12-2012, 11:29 AM
    Thread: WPA2 Attack from dictionary has bug?! (Solved)
Post: RE: WPA2 Attack from dictionary has bug?!

epixoip Wrote: (11-12-2012, 09:37 AM) -- ... use -o to capture the password to a file for further analysis. -- Thanx for reply. I checked again with '-o' but result is the same. :) mcedit shows all ...
Buran Very old oclHashcat-plus Support 8 26,942 11-12-2012, 10:41 AM
    Thread: WPA2 Attack from dictionary has bug?! (Solved)
Post: WPA2 Attack from dictionary has bug?! (Solved)

Code: -- oclHashcat-plus v0.09 by atom starting... Hashes: 1 total, 1 unique salts, 1 unique digests Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes Rules: 1 Workload: 256 loops, 80...
Buran Very old oclHashcat-plus Support 8 26,942 11-12-2012, 09:23 AM