01-31-2014, 04:32 AM
(This post was last modified: 01-31-2014, 05:01 AM by Roham Soroush.)
Maybe tell me, all the documents i need about Oclhashcat is in the internet. But it's my first time want to crack handshake.
And i think this is the best place to ask.
Ok, 3 weeks ago I captured WPA2 handshake. I've searched the Internet. And Best software proposed was oclhashcat.
My hardware are as follows:
CPU: i7
RAM:6 GB
GraphicL Nvidia 740m
Operating systems and software that I had installed:
OS: Ubuntu 13.10 64bit
and i download last version of oclHashcat-1.01 and hashcat-0.47.7z.
What else do I do?
How can I use the oclHashcat-1.01 for Brute-force attack?
And i think this is the best place to ask.
Ok, 3 weeks ago I captured WPA2 handshake. I've searched the Internet. And Best software proposed was oclhashcat.
My hardware are as follows:
CPU: i7
RAM:6 GB
GraphicL Nvidia 740m
Operating systems and software that I had installed:
OS: Ubuntu 13.10 64bit
Code:
root@Support-Pc:~# ls /usr/lib/ | grep -i nvidia
nvidia
nvidia-319-updates
nvidia-cuda-toolkit
root@Support-Pc:~#
Code:
root@Support-Pc:~# nvcc --version
nvcc: NVIDIA (R) Cuda compiler driver
Copyright (c) 2005-2012 NVIDIA Corporation
Built on Fri_Sep_21_17:28:58_PDT_2012
Cuda compilation tools, release 5.0, V0.2.1221
root@Support-Pc:~#
and i download last version of oclHashcat-1.01 and hashcat-0.47.7z.
What else do I do?
How can I use the oclHashcat-1.01 for Brute-force attack?