02-11-2013, 01:35 AM
exus_28 doesn't have a problem.
HELP!!!
|
02-11-2013, 01:35 AM
exus_28 doesn't have a problem.
02-11-2013, 07:31 AM
His real problem is ignorance. But it's still a problem...
02-11-2013, 12:18 PM
Kuci and epixoip, thank you very much! It was like you said, now it calculates 132k/s on 925Mhz and 160k/s on 1100Mhz
![]()
02-11-2013, 03:57 PM
Good to see
![]()
02-11-2013, 07:01 PM
(02-11-2013, 03:57 PM)Kuci Wrote: Good to seeYes, you make my day ![]() And the last question, can i use for example 1GPU HD7970 and second 2GPU HD4850 for hascatplus64? The command will be : oclhashcat-plus64.exe -m 2500 -n 80 --gpu-loops 4096 -a 3 test.hccap ?u?u?u?u?u?u?u?u or different?
02-11-2013, 08:17 PM
No you can't because of drivers. For HD 48XX you need legacy drivers, but they don't support HD 79XX. Catalyst 13.1 doesn't support HD 48XX. Only chance is to set-up cluster and use oclHashcat-plus v0.12.
Oh....
Look i'm trying to make bruteforce attack for example all small letters and numbersfrom 0 to 9. My pass 8 dig, can you help me with command please... I tried: oclhashcat-plus64.exe -m 2500 -n 80 --gpu-loops 4096 -a3 test.hccap -1?l?d ?1?1?1?1?1?1?1?1 And he shows me 212 days ![]()
02-12-2013, 06:44 AM
your command is correct. brute forcing wpa is braindead.
02-12-2013, 07:27 AM
Yeah. Bruteforcing WPA is not a good idea. It's made to be that slow. True hackers use combinations of several tools, for example keyloggers, special dictionaries for specific target...Using bruteforce on WPA is useful only when you have some hints, for example first 4 characters + whole password configuration and you can complete last 4 characters with bruteforce.
|
« Next Oldest | Next Newest »
|