HELP!!!
#21
exus_28 doesn't have a problem.
Reply
#22
His real problem is ignorance. But it's still a problem...
Reply
#23
Kuci and epixoip, thank you very much! It was like you said, now it calculates 132k/s on 925Mhz and 160k/s on 1100Mhz Big Grin
Reply
#24
Good to see Smile Try to play with it first, when you'll have some problem next time.
Reply
#25
(02-11-2013, 03:57 PM)Kuci Wrote: Good to see Smile Try to play with it first, when you'll have some problem next time.
Yes, you make my day Smile
And the last question, can i use for example 1GPU HD7970 and second 2GPU HD4850 for hascatplus64?
The command will be :
oclhashcat-plus64.exe -m 2500 -n 80 --gpu-loops 4096 -a 3 test.hccap ?u?u?u?u?u?u?u?u
or different?
Reply
#26
No you can't because of drivers. For HD 48XX you need legacy drivers, but they don't support HD 79XX. Catalyst 13.1 doesn't support HD 48XX. Only chance is to set-up cluster and use oclHashcat-plus v0.12.
Reply
#27
Oh....
Look i'm trying to make bruteforce attack for example all small letters and numbersfrom 0 to 9. My pass 8 dig, can you help me with command please...
I tried:
oclhashcat-plus64.exe -m 2500 -n 80 --gpu-loops 4096 -a3 test.hccap -1?l?d ?1?1?1?1?1?1?1?1

And he shows me 212 days Big Grin But i think i write wrong.... Cause i can't to believe only letters 8 dig takes only 16 days, but i putted only 10 extra numbers.....
Reply
#28
your command is correct. brute forcing wpa is braindead.
Reply
#29
Yeah. Bruteforcing WPA is not a good idea. It's made to be that slow. True hackers use combinations of several tools, for example keyloggers, special dictionaries for specific target...Using bruteforce on WPA is useful only when you have some hints, for example first 4 characters + whole password configuration and you can complete last 4 characters with bruteforce.
Reply