oclHashcat exhausted immediatly when using long mask on WPA brute-force attack
#4
No, has nothing to do with memory. In a mask attack candidates are generated on the GPU.

The simple and obvious answer is that mask attacks are limited to 15 characters. Each attack mode has a different limit. 55 characters is for dictionary attacks.

The attack you want to run is impossible anyway even if hashcat did support it. Do the math.

16^26 / 200000 / 31556926 =~ 3213622518817528429 years.


Messages In This Thread
RE: oclHashcat exhausted immediatly when using long mask on WPA brute-force attack - by epixoip - 11-26-2014, 10:28 AM