Posts: 2
	Threads: 1
	Joined: May 2024
	
	
 
	
	
		Hello, 
I want to know what is the instance on Amazon aws for crack the wpa2 key 22000 ? 
i want to test this one  : hashcat.exe -m 22000 -a 3  handshake.hc22000 a?a?a?a?a?a?a?a?
or the command for only a-z and 0-9. How long it takes ? thanks.
	
	
	
	
	
 
 
	
	
	
		
	Posts: 215
	Threads: 0
	Joined: Nov 2017
	
	
 
	
	
		?a?a?a?a?a?a?a?a = 6634204312890625 passwords to test. 
Hash-Mode 22000 (WPA-PBKDF2-PMKID+EAPOL) 
[Iterations: 4095] on AWS g5.12xlarge (4 GPU's, $5.672 per hour) runs at roughly 
4000 kilo hashes per second
Meaning on AWS g5.12xlarge it will take about 53 years to complete.
Only a-z and 0-9 (?d?l) for 8 characters is 2821109907456 passwords to test. This would only take only 8 days and cost around 1 million dollars.
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 389
	Threads: 1
	Joined: Nov 2017
	
	
 
	
		
		
		05-15-2024, 12:36 AM 
(This post was last modified: 05-15-2024, 12:36 AM by slyexe.
 Edit Reason: typo
)
		
	 
	
		Damn only a 1-million payout in 8 days? I should be renting my equipment, I'd be rich! 
Eitherway, testing only a-z and 0-9 would require creating a custom character list by using -1 and applying its parameters for lowercase and digits.
So your attack would essentially be:
Code:
hashcat.exe -m 22000 -a 3 -1 l?d? handshake.hc22000 1?1?1?1?1?1?1?1?
As for the logic behind trying a bruteforce of 8 is kind of beyond my knowledge unless you know something I don't. Seems like a waste of time to me.
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 2
	Threads: 1
	Joined: May 2024
	
	
 
	
	
		@DanielG so you think it's impossible to bruteforce a wpa2 key ?
@slyexe with this command : hashcat.exe -m 22000 -a 3 -1 l?d? handshake.hc22000 1?1?1?1?1?1?1?1?
How long it's take with AWS g5.12xlarge ? 
thanks.