o c/s using oclhashcat plus 0.09
#1
I am using a HD 5870 card on Windows 7 64 bit using Catalyst 12.8. I am testing this on a WPA handshake I captured in airodump and converted to hccap using cap2hccap. I get the following output...

Quote:C:\Users\snooz\Desktop\oclHashcat-plus-0.09>oclHashcat-plus64.exe -m 2500 test.hcc
oclHashcat-plus v0.09 by atom starting...

Hashes: 1 total, 1 unique salts, 1 unique digests
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes
Rules: 1
Workload: 16 loops, 8 accel
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c
Device #1: Cypress, 1024MB, 850Mhz, 20MCU
Device #1: Kernel ./kernels/4098/m2500.Cypress_938.2_1.4.1741.kernel (1819056 by
tes)

Starting attack in stdin mode...

Status.......: Running
Input.Mode...: Pipe
Hash.Target..: BSSID (router MAC <-> my MAC)
Hash.Type....: WPA/WPA2
Time.Running.: 10 secs
Time.Util....: 10142.1ms/0.0ms Real/CPU, 0.0% idle
Speed........: 0 c/s Real, 0 c/s GPU
Recovered....: 0/1 Digests, 0/1 Salts
Progress.....: 0
Rejected.....: 0
HWMon.GPU.#1.: 22% Util, 58c Temp, 26% Fan

Status.......: Running
Input.Mode...: Pipe
Hash.Target..: BSSID (router MAC <-> my MAC)
Hash.Type....: WPA/WPA2
Time.Running.: 20 secs
Time.Util....: 20282.0ms/0.0ms Real/CPU, 0.0% idle
Speed........: 0 c/s Real, 0 c/s GPU
Recovered....: 0/1 Digests, 0/1 Salts
Progress.....: 0
Rejected.....: 0
HWMon.GPU.#1.: 15% Util, 59c Temp, 26% Fan

Status.......: Running
Input.Mode...: Pipe
Hash.Target..: BSSID (router MAC <-> my MAC)
Hash.Type....: WPA/WPA2
Time.Running.: 30 secs
Time.Util....: 30422.7ms/0.0ms Real/CPU, 0.0% idle
Speed........: 0 c/s Real, 0 c/s GPU
Recovered....: 0/1 Digests, 0/1 Salts
Progress.....: 0
Rejected.....: 0
HWMon.GPU.#1.: 46% Util, 59c Temp, 26% Fan

I suspect I've done something wrong because I keep getting 0 c/s and less than 50% utility of my GPU; sometimes the GPU will be at 0%. Is my command line missing something? Thanks.
#2
Yes, it's missing a dict.
#3
(10-22-2012, 12:08 AM)M@LIK Wrote: Yes, it's missing a dict.

Ah okay, so a dict is required? Thanks.
#4
it does if you don't specify an attack mode. please read the output of ''oclHashcat-plus64.exe -h'' and then consult the wiki if you still do not understand.
#5
In order to crack a WPA/WPA2 handshake, you need to have a dictionary and that is probably the only mode of attack which can give you success.

So, to complete your syntax:

oclHashcat-plus64.exe -m 2500 -a 0 test.hcc dict.txt

where, dict.txt is your wordlist.