05-12-2020, 10:53 AM
Thanks for the advise I'm wanting to learn as much as I can about it. I have tested using the maskprocessor, standard dictionary attack and dictionary with rules.
These are the commands I have tried...
//Dictionary
hashcat64.exe -a0 -m2500 -w4 logs.hccapx rockyou.txt
//Brute Force
hashcat64.exe -a3 -m2500 -w4 --increment --increment-min 8 --increment-max 12 logs.hccapx ?a?a?a?a?a?a?a?a?a?a?a?a?
//Dictionary with rules
hashcat64.exe -m2500 -w4 -r rules/best64.rule logs.hccapx rockyou.txt
//Brute force with maskprocessor
mp64.exe ?a?a?a?a?a?a?a?a | hashcat64.exe -m2500 logs.hccapx
The issue I have isn't really the type of attack, its the performance, all of these commands are running at around 80,000 to 90,000 H/s. My GPU is only running at 1-2% capacity, the fans are not even kicking in. This is the slowest WPA2 cracker I have used so far but everywhere on the internet says its the fastest. If I can get this to run at 100% capacity I would be looking at doing 50x more attacks in the same timeframe.
I have updated the graphics card drivers to the latest version
These are the commands I have tried...
//Dictionary
hashcat64.exe -a0 -m2500 -w4 logs.hccapx rockyou.txt
//Brute Force
hashcat64.exe -a3 -m2500 -w4 --increment --increment-min 8 --increment-max 12 logs.hccapx ?a?a?a?a?a?a?a?a?a?a?a?a?
//Dictionary with rules
hashcat64.exe -m2500 -w4 -r rules/best64.rule logs.hccapx rockyou.txt
//Brute force with maskprocessor
mp64.exe ?a?a?a?a?a?a?a?a | hashcat64.exe -m2500 logs.hccapx
The issue I have isn't really the type of attack, its the performance, all of these commands are running at around 80,000 to 90,000 H/s. My GPU is only running at 1-2% capacity, the fans are not even kicking in. This is the slowest WPA2 cracker I have used so far but everywhere on the internet says its the fastest. If I can get this to run at 100% capacity I would be looking at doing 50x more attacks in the same timeframe.
I have updated the graphics card drivers to the latest version