Cracking Multiple wpa2 hashes
#2
Code:
ESSID (total unique).....................: 73


This would state there was 73 different routers detected however it doesn't determine how many devices you received a PMKID or handshake with. So if there is a specific device you're wanting to attack you'll have to isolate it from the capture and place it in its own text file. This can all be done by simply opening the hc2200 file with your favourite text editor. 

When you attack multicapture file you'll see that the attack will list the amount of digest and salts. Digest relate to the device which properly submitted the hash and the salt are the total different hashes. So you could have 100 digest and 1 salt and that would mean finding the password for 1 digest would reveal for the other 99 digest.

CUDA API (CUDA 11.7)
====================
* Device #1: NVIDIA GeForce RTX 3090, 23336/24575 MB, 82MCU
* Device #2: NVIDIA GeForce RTX 3090, 23336/24575 MB, 82MCU
* Device #3: NVIDIA GeForce RTX 3090, 23336/24575 MB, 82MCU
* Device #4: NVIDIA GeForce RTX 3090, 23336/24575 MB, 82MCU

Minimum password length supported by kernel: 8
Maximum password length supported by kernel: 63
Hashes: 36 digests; 36 unique digests, 9 unique salts

So if you have several salts that would become your ratio for the time of the attack. So if you have 100kh/s and 1 salt takes 100 seconds, adding a 2nd salt would increase your time to 200 seconds and so forth. 
Reply


Messages In This Thread
Cracking Multiple wpa2 hashes - by Toroloco - 09-05-2022, 08:58 PM
RE: Cracking Multiple wpa2 hashes - by slyexe - 09-06-2022, 04:09 AM
RE: Cracking Multiple wpa2 hashes - by Toroloco - 09-07-2022, 02:50 AM
RE: Cracking Multiple wpa2 hashes - by slyexe - 09-07-2022, 03:20 AM
RE: Cracking Multiple wpa2 hashes - by ZerBea - 09-07-2022, 06:53 AM