Speed of crack for WPA/WPA2 hash
#7
(09-02-2017, 08:59 PM)undeath Wrote: The wiki article you mention is about maskprocessor, not hashcat. If you use mp the candidates are generated on cpu.

Using hashcat's a3 mode is always better than using mp if you don't need any special features of mp.

Ok... so I understand from your answer that when using hashcat mask engine such as "hashcat -a3" then it use the GPU to generate the passwords while if I used the MP64  or Princeprocessor then it use the CPU and Not GPU. Please confirm my understanding. (Although I didnot find on hashcat wiki that hashcat buildin mask attack uses GPU)


Incase yes, then what considered faster in terms of h/s ? Mask engine attack or rule attack? Since both are processed by the GPU.

Thank you.


Messages In This Thread
RE: Speed of crack for WPA/WPA2 hash - by philsmd - 09-02-2017, 08:40 AM
RE: Speed of crack for WPA/WPA2 hash - by undeath - 09-02-2017, 08:59 PM
RE: Speed of crack for WPA/WPA2 hash - by roundcube222 - 09-02-2017, 10:36 PM
RE: Speed of crack for WPA/WPA2 hash - by undeath - 09-03-2017, 05:15 PM
RE: Speed of crack for WPA/WPA2 hash - by philsmd - 09-03-2017, 07:33 PM