Posts: 2
Threads: 1
Joined: May 2024
Hello,
I want to know what is the instance on Amazon aws for crack the wpa2 key 22000 ?
i want to test this one : hashcat.exe -m 22000 -a 3 handshake.hc22000 a?a?a?a?a?a?a?a?
or the command for only a-z and 0-9. How long it takes ? thanks.
Posts: 193
Threads: 0
Joined: Nov 2017
?a?a?a?a?a?a?a?a = 6634204312890625 passwords to test.
Hash-Mode 22000 (WPA-PBKDF2-PMKID+EAPOL)
[Iterations: 4095] on AWS g5.12xlarge (4 GPU's, $5.672 per hour) runs at roughly
4000 kilo hashes per second
Meaning on AWS g5.12xlarge it will take about 53 years to complete.
Only a-z and 0-9 (?d?l) for 8 characters is 2821109907456 passwords to test. This would only take only 8 days and cost around 1 million dollars.
Posts: 374
Threads: 0
Joined: Nov 2017
05-15-2024, 12:36 AM
(This post was last modified: 05-15-2024, 12:36 AM by slyexe.
Edit Reason: typo
)
Damn only a 1-million payout in 8 days? I should be renting my equipment, I'd be rich!
Eitherway, testing only a-z and 0-9 would require creating a custom character list by using -1 and applying its parameters for lowercase and digits.
So your attack would essentially be:
Code:
hashcat.exe -m 22000 -a 3 -1 l?d? handshake.hc22000 1?1?1?1?1?1?1?1?
As for the logic behind trying a bruteforce of 8 is kind of beyond my knowledge unless you know something I don't. Seems like a waste of time to me.
Posts: 2
Threads: 1
Joined: May 2024
@DanielG so you think it's impossible to bruteforce a wpa2 key ?
@slyexe with this command : hashcat.exe -m 22000 -a 3 -1 l?d? handshake.hc22000 1?1?1?1?1?1?1?1?
How long it's take with AWS g5.12xlarge ?
thanks.