8 BILLION hashes/sec on V100s
#1
The hashcat is very slow compared to dedicated C++ CUDA program.

How to modify this program to allow Hash-Mode 22000 (WPA PMKID+EAPOL (WPA*01/2)) password search? See youtube source, program is processing 8 BILLION hashes/sec on V100s.

hc2000 data can be defined in the program or the program can read the *.hc22000 file

I would like to test in on known password with 8 characters (lower case, upper case and digits) i.e. 218 E12 brute force combinations. With 32 Gh/s it should takes less than 2 hours.

I tested the above mentioned program on my laptop (LinuxKALI/CUDA/NVCC) with NVIDIA GeForce GTX 960M. The program is running very fast. I got about 32 Gh/s.
Reply
#2


I add that if I use the hashcat program on my laptop, I will achieve a speed of about 50 kh/s versus 32 Gh/s if I use the special program see above. The hashcat is 640,000x slower.
Reply
#3
(10-07-2022, 04:54 PM)Caster Wrote:
(10-07-2022, 10:31 AM)Caster Wrote:


I add that if I use the hashcat program on my laptop, I will achieve a speed of about 50 kh/s versus 32 Gh/s if I use the special program see above. The hashcat is 640,000x slower.

Hashes produced by different algorithms are not equivalent. Different algorithms run at different speeds because they are doing different things.
Reply
#4
I understand this but I am not an expert in these different algorithms. That's why I would highly appreciate if someone can find out what algorithm is the dedicated program using and make hashing speed test with the same algorithm with hashcat so that the hashing speeds can be compared.

The next think would be to find out how to modify it to allow Hash-Mode 22000.
Reply
#5
(10-07-2022, 07:23 PM)Caster Wrote:
(10-07-2022, 04:58 PM)pdo Wrote:
I understand this but I am not an expert in these different algorithms. That's why I would highly appreciate if someone can find out what algorithm is the dedicated program using and make hashing speed test with the same algorithm with hashcat so that the hashing speeds can be compared.

The next think would be to find out how to modify it to allow Hash-Mode 22000.

This program seems to be doing SHA256, which is already very fast in hashcat, and no, that's not going to help hashcat get mode 22000 any faster.
Reply
#6
I am trying to run hashcat with example hash-22000 but I am not sure of i run it with correct parameters:

Quote:hashcat -a 3 -m 22000 WPA*01*4d4fe7aac3a2cecab195321ceb99a7d0*fc690c158264*f4747f87f9f4*686173686361742d6573736964*** ?l?l?l?l?l?l?l

INFO: All hashes found as potfile and/or empty entries! Use --show to display them.

I understand that the sample password "hashcat" has 7 characters, but the minimum for a 22000 hash is 8 characters.

Is there any example hash with 8 characters password?
Reply
#7
(10-07-2022, 10:04 PM)Caster Wrote: I am trying to run hashcat with example hash-22000 but I am not sure of i run it with correct parameters:

Quote:hashcat -a 3 -m 22000 WPA*01*4d4fe7aac3a2cecab195321ceb99a7d0*fc690c158264*f4747f87f9f4*686173686361742d6573736964*** ?l?l?l?l?l?l?l

INFO: All hashes found as potfile and/or empty entries! Use --show to display them.

I understand that the sample password "hashcat" has 7 characters, but the minimum for a 22000 hash is 8 characters.

Is there any example hash with 8 characters password?

Because the minimum is eight characters the password for the WPA example is: hashcat!
Reply