05-13-2018, 03:54 AM 
		
	
	
		I'm trying to decrypt 2500 WPA2
	
	
	
	
	
| 
					[ANSWERED] New user, custom brute force  help
				 | 
| 
		
		
		05-13-2018, 03:54 AM 
		
	 
		I'm trying to decrypt 2500 WPA2
	 
		
		
		05-13-2018, 04:00 AM 
		
	 
		Not much to go on to help you here.  Please also note that you're not 'decrypting' - there is no 'reversing' or 'decrypting' of true hashes. Hashes are not encryption. When you're trying to crack a hash, you're hashing many strings until a hash matches the hash you have. 
~
 
		you won't complete that brute force attack within your lifetime with a single high end gpu.
	 
		
		
		05-14-2018, 12:07 AM 
		
	 
		
		
		05-14-2018, 12:10 AM 
		
	 (05-14-2018, 12:07 AM)cryptozin Wrote:(05-12-2018, 07:56 PM)h1430210 Wrote: For 10 digits using no numbers, uppercase letters, lowercase letters, @, #, and $, Is there a way to save the cracking progress? In case of pc crash or energy down etc? So doesn`t have to start over? 
		
		
		05-14-2018, 12:59 AM 
		
	 
		Yep, that happens automatically - state is saved periodically to a restore file, and you use --restore to restore.
	 
~
 
		
		
		05-14-2018, 01:25 AM 
		
	 | 
| 
					« Next Oldest | Next Newest »
				 |