Cracking speed
#1
Hi guys,
I am trying to crack a WPA handshake via bruteforce, the password consists of eight capital letters. The command which I use in hashcat is the following:

hashcat -m 2500 -a 3 handshake.cap

Now, my question: when I tried the same via aircrack-ng and crunch, it was able to try about 1500 pw per second. Hashcat manages about 24MILLION per second
according to the status output that I get when trying to crack it. How is that possible?


Messages In This Thread
Cracking speed - by Junario - 07-06-2014, 05:35 PM
RE: Cracking speed - by undeath - 07-06-2014, 06:17 PM
RE: Cracking speed - by Junario - 07-06-2014, 06:26 PM
RE: Cracking speed - by philsmd - 07-06-2014, 07:09 PM