WPA2 Attack from dictionary has bug?! (Solved)
#1
Code:
oclHashcat-plus v0.09 by atom starting...

Hashes: 1 total, 1 unique salts, 1 unique digests
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes
Rules: 1
Workload: 256 loops, 80 accel
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 60c
Device #1: Cypress, 1024MB, 875Mhz, 20MCU
...............................................................
Status.......: Running
Input.Mode...: Pipe
Hash.Target..: (XXXXXXXXXXXXXX)
Hash.Type....: WPA/WPA2
Time.Running.: 37 mins, 40 secs
Time.Util....: 2260846.2ms/77531.7ms Real/CPU, 3.6% idle
Speed........:    95840 c/s Real,    99362 c/s GPU
Recovered....: 0/1 Digests, 0/1 Salts
Progress.....: 216678400
Rejected.....: 0
HWMon.GPU.#1.: 98% Util, 45c Temp, 27% Fan

ESSID:\ufffd\ufffdI\ufffd\ufffd,;ZL                      
                                            
Status.......: Cracked
Input.Mode...: Pipe
Hash.Target..: (XXXXXXXXXXXXXX)
Hash.Type....: WPA/WPA2
Time.Running.: 37 mins, 43 secs
Time.Util....: 2263967.6ms/77589.6ms Real/CPU, 3.5% idle
Speed........:    95888 c/s Real,    98585 c/s GPU
Recovered....: 1/1 Digests, 1/1 Salts
Progress.....: 217088000
Rejected.....: 0
HWMon.GPU.#1.: 84% Util, 43c Temp, 24% Fan
Ubuntu 10.04.3 32-bit 4 Gb PAE
The dictionary has 7bit ASCII haracters returned by "enca"
May be anyone explain me, that the f...... ???


Attached Files Thumbnail(s)
   


Messages In This Thread
WPA2 Attack from dictionary has bug?! (Solved) - by Buran - 11-12-2012, 09:23 AM