Temperature abort trigger NVIDIA GeForce GTX 670
#11
it seems, I understood one problem - I don't see creeping lines, because:




cudaHashcat v1.31 starting...

Device #1: GeForce GTX 670, 2048MB, 1019Mhz, 7MCU

Hashes: 1 hashes; 1 unique digests, 1 unique salts
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes
Applicable Optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force
Watchdog: Temperature abort trigger set to 80c
Watchdog: Temperature retain trigger set to 80c
Device #1: Kernel ./kernels/4318/m02500.sm_30.64.ptx
Device #1: Kernel ./kernels/4318/markov_le_v1.64.ptx
Device #1: Kernel ./kernels/4318/bzero.64.ptx

[s]tatus [p]ause [r]esume ypass [q]uit =>

Session.Name...: 1
Status.........: Running
Input.Mode.....: Mask (?1?1?1?1?1?1?1?1) [8]
Hash.Target....: wi-fi-rt41 (00:1c:26:0e:e7:a7 <-> 7c:03:d8:9c:61:da)
Hash.Type......: WPA/WPA2
[b]Time.Started...: Mon Oct 13 04:07:11 2014 (3 secs)
Time.Estimated.: Mon Nov 28 13:15:14 2016 (2 years, 47 days)

Speed.GPU.#1...: 47369 H/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 157696/2821109907456 (0.00%)
Skipped........: 0/157696 (0.00%)
Rejected.......: 0/157696 (0.00%)
HWMon.GPU.#1...: 98% Util, 64c Temp, N/A Fan

[s]tatus [p]ause [r]esume [b]ypass [q]uit =>

2 years, 47 days !!!!! It that for digits?
#12
I cracked this password already earlier, wanted to check a program runtime with use of GPU.
#13
wpa is slow. with aircrack you certainly did a wordlist attack. and this is not digit but digit+lower.
#14
Sorry if I do not speak properly.
Usually when you launch hashcat or aircrack, on the monitor running numbers, letters. In this case I don't see these running digits, letters on the monitor therefore I thought that the program stops for some reason, and I clicked "q". And when I clicked "s", it appeared that the program works, only very slowly, Time.Estimated.: Mon Nov 28 13:15:14 2016 (2 years, 47 days). Question: why it so slowly works?
#15
It's not slow, your keyspace is too big for this algo/gpu combination. You want to bruteforce 2821109907456 keyspace because you bruteforcing 8 number/small letter space. For wpa people use other techniques like wordlist attack, possibly on pyrit you also did so.