Is this WPA2 Password uncrackable?
#1
here is the command line:
hashcat64.exe -m 2500 -a3 davehash.hccapx -1 0123456789abcdefghijklmnopqrstuvqxyzABCDEFGHIJKLMNOPQRSTUVWXYZ ?1?1?1?1?1?1?1?1?1?1?1?1

I receive this error:

The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework
Approaching final keyspace - workload adjusted.

#
I know that password is from a-z,0-9 ,A-Z and 12 characters long.
Is this just too many charterers? 

I am new to hashcat, so please be gentle with terminology and abbreviations please.

Thank you
#2
It's not an error, it's purely informational.

You can also shorten your command line up quite a bit by using -1 ?d?l?u instead of manually listing out all of the characters in the character set.
#3
(06-19-2017, 10:15 PM)epixoip Wrote: It's not an error, it's purely informational.

You can also shorten your command line up quite a bit by using -1 ?d?l?u instead of manually listing out all of the characters in the character set.

So is it uncrackable then? I do not understand what it is telling me .
 Too many characters in length or too many characters to choose from?

Can you explain this also "?d?l?u"
?d=0-9 ?u=A-Z ?l=a-z :: 
But how do i use this in the command? How do i specify the length of the password?

Can you shorten the command I wrote as an example please.

thank you for the fast reply
#4
It means :
Code:
hashcat64.exe -m 2500 -1 ?d?u?l  davehash.hccapx ?1?1?1?1?1?1?1?1?1?1?1?1
Hint: I don't know your graphic card but it will last some months ;-)
#5
(06-19-2017, 10:48 PM)Mem5 Wrote: It means :
Code:
hashcat64.exe -m 2500 -1 ?d?u?l  davehash.hccapx ?1?1?1?1?1?1?1?1?1?1?1?1
Hint: I don't know your graphic card but it will last some months ;-)

But is it possible to crack a 12 character password? What is the issue with this command. What command do I need to use? What am i doing wrong etc 


 can you please help me.
Thanks for the reply
#6
Yes, it is possible to crack a 12 character password. It's just a matter of how long it will take your system to do it.

What error message do you get when you enter that command " hashcat64.exe -m 2500 -1 ?d?u?l davehash.hccapx ?1?1?1?1?1?1?1?1?1?1?1?1 "

Google for the error message.
#7
Just to give you an idea -- my system running dual NVIDIA GTX1070's on a 10 WPA/WPA2 hash shows that it will take 46696 years and that's only brute forcing 10 characters versus your 12.

[s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit => s

Session..........: hashcat
Status...........: Running
Hash.Type........: WPA/WPA2
Hash.Target......: <Redacted>
Time.Started.....: Mon Jun 19 19:32:01 2017 (1 min, 2 secs)
Time.Estimated...: Thu Aug 20 05:19:43 2020 (46696 years, 52 days)
Guess.Mask.......: ?1?1?1?1?1?1?1?1?1?1 [10]
Guess.Charset....: -1 ?u?l?d, -2 Undefined, -3 Undefined, -4 Undefined
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#2.....: 289.2 kH/s (12.48ms)
Speed.Dev.#3.....: 280.4 kH/s (6.26ms)
Speed.Dev.#*.....: 569.6 kH/s
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 34805760/839299365868340224 (0.00%)
Rejected.........: 0/34805760 (0.00%)
Restore.Point....: 0/13537086546263552 (0.00%)
Candidates.#2....: Warinanera -> WmYJananer
Candidates.#3....: JgDelerder -> JqEginaner
HWMon.Dev.#2.....: Temp: 74c Fan: 31% Util: 97% Core: 131MHz Mem:3802MHz Bus:8
HWMon.Dev.#3.....: Temp: 72c Fan: 27% Util: 95% Core: 131MHz Mem:3802MHz Bus:8
#8
Sorry I didn't realize the length of your mask was 12 bytes long. Hashcat stores keyspace as a uint64 and 62^12 is greater than 2^64-1, hence it is causing an integer overflow, and that's why Hashcat thinks the keyspace is too small. An integer overflow check was added a few months back, so you must be using an old version.
#9
(06-20-2017, 01:59 AM)epixoip Wrote: Sorry I didn't realize the length of your mask was 12 bytes long. Hashcat stores keyspace as a uint64 and 62^12 is greater than 2^64-1, hence it is causing an integer overflow, and that's why Hashcat thinks the keyspace is too small. An integer overflow check was added a few months back, so you must be using an old version.

I am using Hashcat 3.6.0. Is there a way around this? Thanks for the reply.
#10
Your problem is not about the lenght of mask, but "Time.Estimated...: Thu Aug 20 05:19:43 2020 (46696 years, 52 days)"
Cracking WPA is slow. If you ask for 12 chars (lower-upper-digits) it will take 46696 years => good luck.
Solution ? Buy more graphic cards and/or reduce the mask.