Cracking a password present in wordlist doesn't work
#20
NONCE-ERROR-CORRECTIONS is explained here:
https://hashcat.net/forum/thread-6361.html


An example has is take from here:
https://hashcat.net/wiki/doku.php?id=example_hashes

I have a NVIDIA 1080 TI. The GPU is undervolted, because I'm a coder and not a hashcracker. In combination with hcxdumptool/hcxtools/hashcat/JtR it is more than enough for me.
Code:
$ hashcat -m 22000 --benchmark
hashcat (v6.2.6-532-g939a97d14) starting in benchmark mode
CUDA API (CUDA 12.2)
====================
* Device #1: NVIDIA GeForce GTX 1080 Ti, 10818/11169 MB, 28MCU

OpenCL API (OpenCL 3.0 CUDA 12.2.79) - Platform #1 [NVIDIA Corporation]
=======================================================================
* Device #2: NVIDIA GeForce GTX 1080 Ti, skipped

Benchmark relevant options:
===========================
* --backend-devices-virtual=1
* --optimized-kernel-enable

-------------------------------------------------------------
* Hash-Mode 22000 (WPA-PBKDF2-PMKID+EAPOL) [Iterations: 4095]
-------------------------------------------------------------

Speed.#1.........:   612.1 kH/s (90.32ms) @ Accel:16 Loops:1024 Thr:512 Vec:1

Started: Tue Jul 25 12:17:59 2023
Stopped: Tue Jul 25 12:18:21 2023


Default NC == 8
Code:
$ hashcat -m 22000 "WPA*02*024022795224bffca545276c3762686f*6466b38ec3fc*225edc49b7aa*54502d4c494e4b5f484153484341545f54455354*10e3be3b005a629e89de088d6a2fdc489db83ad4764f2d186b9cde15446e972e*0103007502010a0000000000000000000148ce2ccba9c1fda130ff2fbbfb4fd3b063d1a93920b0f7df54a5cbf787b16171000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001630140100000fac040100000fac040100000fac028000*a2" hashmob.net_2023-07-23.large.found
Session..........: hashcat
Status...........: Running
Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL)
Hash.Target......: 024022795224bffca545276c3762686f:6466b38ec3fc:225ed...T_TEST
Time.Started.....: Tue Jul 25 12:16:37 2023 (4 secs)
Time.Estimated...: Tue Jul 25 12:20:11 2023 (3 mins, 30 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (hashmob.net_2023-07-23.large.found)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:   228.3 kH/s (5.66ms) @ Accel:4 Loops:256 Thr:512 Vec:1
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)
Progress.........: 1388085/49365271 (2.81%)
Rejected.........: 527925/1388085 (38.03%)
Restore.Point....: 1388085/49365271 (2.81%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: champola -> stellarose1
Hardware.Mon.#1..: Temp: 63c Fan: 42% Util: 24% Core:1708MHz Mem:5005MHz Bus:16

NC == 0
Code:
$ hashcat -m 22000 --nonce-error-corrections=0 "WPA*02*024022795224bffca545276c3762686f*6466b38ec3fc*225edc49b7aa*54502d4c494e4b5f484153484341545f54455354*10e3be3b005a629e89de088d6a2fdc489db83ad4764f2d186b9cde15446e972e*0103007502010a0000000000000000000148ce2ccba9c1fda130ff2fbbfb4fd3b063d1a93920b0f7df54a5cbf787b16171000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001630140100000fac040100000fac040100000fac028000*a2" hashmob.net_2023-07-23.large.found
Session..........: hashcat                                
Status...........: Quit
Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL)
Hash.Target......: 024022795224bffca545276c3762686f:6466b38ec3fc:225ed...T_TEST
Time.Started.....: Tue Jul 25 12:17:34 2023 (4 secs)
Time.Estimated...: Tue Jul 25 12:19:56 2023 (2 mins, 18 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (hashmob.net_2023-07-23.large.found)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:   343.3 kH/s (11.37ms) @ Accel:8 Loops:256 Thr:512 Vec:1
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)
Progress.........: 1726213/49365271 (3.50%)
Rejected.........: 694021/1726213 (40.20%)
Restore.Point....: 1657296/49365271 (3.36%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: billchen -> daniel0708
Hardware.Mon.#1..: Temp: 73c Fan: 54% Util: 26% Core:1746MHz Mem:5005MHz Bus:16

NC == 1024
Code:
$ hashcat -m 22000 --nonce-error-corrections=1024 "WPA*02*024022795224bffca545276c3762686f*6466b38ec3fc*225edc49b7aa*54502d4c494e4b5f484153484341545f54455354*10e3be3b005a629e89de088d6a2fdc489db83ad4764f2d186b9cde15446e972e*0103007502010a0000000000000000000148ce2ccba9c1fda130ff2fbbfb4fd3b063d1a93920b0f7df54a5cbf787b16171000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001630140100000fac040100000fac040100000fac028000*a2" hashmob.net_2023-07-23.large.found
Session..........: hashcat
Status...........: Running
Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL)
Hash.Target......: 024022795224bffca545276c3762686f:6466b38ec3fc:225ed...T_TEST
Time.Started.....: Tue Jul 25 12:15:18 2023 (8 secs)
Time.Estimated...: Tue Jul 25 12:23:23 2023 (7 mins, 57 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (hashmob.net_2023-07-23.large.found)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:   100.8 kH/s (5.44ms) @ Accel:4 Loops:256 Thr:512 Vec:1
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)
Progress.........: 1236546/49365271 (2.50%)
Rejected.........: 491074/1236546 (39.71%)
Restore.Point....: 1206339/49365271 (2.44%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: vanesa17 -> chan2009
Hardware.Mon.#1..: Temp: 60c Fan: 40% Util:100% Core:1873MHz Mem:5005MHz Bus:16

I'll say that it is always a good idea to take a look at the MP field (all bits).
Reply


Messages In This Thread
RE: Cracking a password present in wordlist doesn't work - by ZerBea - 07-25-2023, 12:26 PM