cudaHashcat-plus64 on Debian fails when using a known password
#6
Well not for WPA/WPA2 but for other algorithms. There has been a lot of talks on the max. length 15 restriction but still none of them convinced me to overcome with this limit and rewrite the base classes. Also it would require a lot more memory. My main argument is still that the chances to crack 15+ passwords is VERY unusual for whatever algorithm. Only if the passwords is really really bad and in this case you have it in your dictionary and can crack it with aircrack-ng.


Messages In This Thread
RE: cudaHashcat-plus64 on Debian fails when using a known password - by atom - 12-08-2012, 07:55 PM