Posts: 2
Threads: 1
Joined: Jul 2014
Hi guys,
I am trying to crack a WPA handshake via bruteforce, the password consists of eight capital letters. The command which I use in hashcat is the following:
hashcat -m 2500 -a 3 handshake.cap
Now, my question: when I tried the same via aircrack-ng and crunch, it was able to try about 1500 pw per second. Hashcat manages about 24MILLION per second
according to the status output that I get when trying to crack it. How is that possible?
Posts: 2,301
Threads: 11
Joined: Jul 2010
07-06-2014, 06:17 PM
(This post was last modified: 07-06-2014, 06:18 PM by undeath.)
I don't think you read the speed output correctly. On my CPU hashcat was something between 3 and 5 times faster than aircrack. Depending on how many cores your CPU has this may vary.
Posts: 2
Threads: 1
Joined: Jul 2014
Here's a screenie of what hashcat says:
https://i.imgur.com/b0vKCMm.png
As you can see: about 25M(illion) words per second. I assigned six of my eight CPUs to my virtually running The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) linux (on which I am running hashcat).
Posts: 2,267
Threads: 16
Joined: Feb 2013
1. are you sure that the hash file is in the correct format (.hccap format), see
https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2 ,
https://hashcat.net/cap2hccap/ ...
2. screenshot says 0/0 hashes, 0/0 salts, you definitely did something wrong
3. please give full command, the command above seems to be completely wrong, you should have something like:
hashcat-cli64 -m 2500 -a 3 converted_file.hccap --pw-min 8 ?u?u?u?u?u?u?u?u
4. running hashcat in a virtual machine may ofc not give valid/comparable benchmark results
5. please try the example .hccap file from
http://hashcat.net/wiki/doku.php?id=example_hashes (password is 'hashcat!', w/o quotes), to see if it works, example command for that sample could for instance be:
hashcat-cli64 -m 2500 -a 3 hashcat.hccap --pw-min 8 'hashc?l?l?s'