Cracking speed
#1
Hi guys,
I am trying to crack a WPA handshake via bruteforce, the password consists of eight capital letters. The command which I use in hashcat is the following:

hashcat -m 2500 -a 3 handshake.cap

Now, my question: when I tried the same via aircrack-ng and crunch, it was able to try about 1500 pw per second. Hashcat manages about 24MILLION per second
according to the status output that I get when trying to crack it. How is that possible?
#2
I don't think you read the speed output correctly. On my CPU hashcat was something between 3 and 5 times faster than aircrack. Depending on how many cores your CPU has this may vary.
#3
Here's a screenie of what hashcat says:
https://i.imgur.com/b0vKCMm.png

As you can see: about 25M(illion) words per second. I assigned six of my eight CPUs to my virtually running The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) linux (on which I am running hashcat).
#4
1. are you sure that the hash file is in the correct format (.hccap format), see https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2 , https://hashcat.net/cap2hccap/ ...
2. screenshot says 0/0 hashes, 0/0 salts, you definitely did something wrong
3. please give full command, the command above seems to be completely wrong, you should have something like:
hashcat-cli64 -m 2500 -a 3 converted_file.hccap --pw-min 8 ?u?u?u?u?u?u?u?u
4. running hashcat in a virtual machine may ofc not give valid/comparable benchmark results
5. please try the example .hccap file from http://hashcat.net/wiki/doku.php?id=example_hashes (password is 'hashcat!', w/o quotes), to see if it works, example command for that sample could for instance be:
hashcat-cli64 -m 2500 -a 3 hashcat.hccap --pw-min 8 'hashc?l?l?s'