08-22-2014, 08:32 PM
thanks agian for the quick response undeath
throught i was so on to something here extracting the has because it takes a lot less time cracking a hash than the full .hccap. shame
could you please explain what hashcat uses and what its doing in brute force to crack the password
is there a faster way of cracking wpa/wpa2 wireless key 8d9bb4aee3 other than bruteforce on a dual core laptop was told evil twin ap
which is faster the above hashcat code or cat /dev/urandom| tr -dc 'abde3489' | fold -w 10| head -n 999999181801204736 | aircrack-ng -b 00:8A:AE:99:4F:E4 -w - BTHub3-MQZX.cap (1150.23 k/s)
keen2learn
throught i was so on to something here extracting the has because it takes a lot less time cracking a hash than the full .hccap. shame
could you please explain what hashcat uses and what its doing in brute force to crack the password
is there a faster way of cracking wpa/wpa2 wireless key 8d9bb4aee3 other than bruteforce on a dual core laptop was told evil twin ap
which is faster the above hashcat code or cat /dev/urandom| tr -dc 'abde3489' | fold -w 10| head -n 999999181801204736 | aircrack-ng -b 00:8A:AE:99:4F:E4 -w - BTHub3-MQZX.cap (1150.23 k/s)
keen2learn