Brute Force on WPA/WPA2
#6
(08-28-2012, 06:13 PM)qwerty Wrote: Strange...
My command is:
cudaHashcat-plus64.exe --hash-type 2500 --attack-mode 3 --custom-charset1 ?l?u?d C:\Users\qwerty\Desktop\25388_1346083646.hccap ?1?1?1?1?1

and something is strange:
Speed.....: 0 c/s Real, 0 c.s GPU
Progress: 120804151/91632832 (13,19%)
Rejected...: 12084151/120804151 (100%)
HW.Monitor.#1: 0% GPU, 43c Temp

WPA key length is minimum of 8, you have set a mask of 5 and are getting rejected.

cudaHashcat-plus64.exe --hash-type 2500 --attack-mode 3 --custom-charset1 ?l?u?d C:\Users\qwerty\Desktop\25388_1346083646.hccap ?1?1?1?1?1?1?1?1


Messages In This Thread
Brute Force on WPA/WPA2 - by qwerty - 08-27-2012, 09:44 AM
RE: Brute Force on WPA/WPA2 - by radix - 08-27-2012, 09:47 AM
RE: Brute Force on WPA/WPA2 - by qwerty - 08-27-2012, 05:05 PM
RE: Brute Force on WPA/WPA2 - by tony - 08-27-2012, 11:12 PM
RE: Brute Force on WPA/WPA2 - by qwerty - 08-28-2012, 06:13 PM
RE: Brute Force on WPA/WPA2 - by Pixel - 08-28-2012, 06:30 PM