Brute forcing 5-12 character WPA in practice ?
#1
Hi folks,

I've been tasked with setting up a system to test the strength of WPA/WPA2 passwords, and I have a budget of a few thousand dollars to build something.

A remote user will (using besside-ng for example) to grab WPA handshakes, then upload them to whatever system we build to attempt to be cracked.

I have a few basic questions about getting started.

1. Is hashcat (or oclhashcat) the best tool for the job? (cracking WPA/WPA2 handshakes).

2. Is building a desktop/server system with multiple video cards truly the best solution? As opposed to using traditional servers (like a dell rack server, as we have several of these in the datacenter that could be repurposed already).

3. Another option is running a small cluster on EC2. Does anyone do this with hashcat, is it practical?




Thanks for your time.


Messages In This Thread
(kindof) Newbie questions (hardware, amazon ec2 , etc?) - by futant - 01-09-2014, 03:20 AM