07-06-2014, 05:35 PM
Hi guys,
I am trying to crack a WPA handshake via bruteforce, the password consists of eight capital letters. The command which I use in hashcat is the following:
hashcat -m 2500 -a 3 handshake.cap
Now, my question: when I tried the same via aircrack-ng and crunch, it was able to try about 1500 pw per second. Hashcat manages about 24MILLION per second
according to the status output that I get when trying to crack it. How is that possible?
I am trying to crack a WPA handshake via bruteforce, the password consists of eight capital letters. The command which I use in hashcat is the following:
hashcat -m 2500 -a 3 handshake.cap
Now, my question: when I tried the same via aircrack-ng and crunch, it was able to try about 1500 pw per second. Hashcat manages about 24MILLION per second
according to the status output that I get when trying to crack it. How is that possible?