08-26-2013, 12:01 AM
Hi Guys
im hoping to work eventually as a penetration tester and im trying to pickup the wireless security side of pentesting
so im experimenting on my own home wireless, WPA2
ive an NVIDIA GTX 550 Ti card
I cracked my own win8 user LM hash in 10 minutes (8characters, upper/lower and number) - pwdump etc
but when trying my WPA2 of a handshake i got from my wireless
using the following syntax:
cudaHashcat-plus64.exe --hash-type 2500 --attack-mode 3 --outfile C:\Users\username\Desktop\capture.hccap.out C:\Users\uername\Desktop\capture.hccap ?u?u?u?u?u?u?u?u?u
now I know my password is 9 digits all uppercase
but it reckons at 12515 H/s it will take more than 10 years to try every combination
can anyone point me in the right direction to optimising this based on the command line I supplied?
there must be quicker ways of bruteforcing this?
many thanks for your help
im hoping to work eventually as a penetration tester and im trying to pickup the wireless security side of pentesting
so im experimenting on my own home wireless, WPA2
ive an NVIDIA GTX 550 Ti card
I cracked my own win8 user LM hash in 10 minutes (8characters, upper/lower and number) - pwdump etc
but when trying my WPA2 of a handshake i got from my wireless
using the following syntax:
cudaHashcat-plus64.exe --hash-type 2500 --attack-mode 3 --outfile C:\Users\username\Desktop\capture.hccap.out C:\Users\uername\Desktop\capture.hccap ?u?u?u?u?u?u?u?u?u
now I know my password is 9 digits all uppercase
but it reckons at 12515 H/s it will take more than 10 years to try every combination
can anyone point me in the right direction to optimising this based on the command line I supplied?
there must be quicker ways of bruteforcing this?
many thanks for your help