Segmentation Fault when calcultaing keyspace for WPA
#1
Hi,

I have an AMD GPU and wanted to calculate keyspace parameter for WPA and various attack modes.
I read this instruction, and trying to use command for WPA (-m 2500).
It works well with "-m 2611", but with "-m 2500" I am getting "Segmentation Fault (core dumped)" under Ubuntu and Exception under Windows.
Tried 1.37 and 1.36 versions of oclHashcat.


The same issue appears and under Ubuntu.
Benchmark and attacks works well.

Screenshots are in attachments.


Attached Files
.jpg   benchmark.JPG (Size: 43.44 KB / Downloads: 10)
.jpg   segfault.JPG (Size: 62.02 KB / Downloads: 10)
#2
Yeah, crashes for me too but then again the command makes no sense.

1. WPA mode expects a hashcat capture file (.hccap), not a wordlist or hashes file.
2. WPA passwords are a minimum of 8 characters in length

So grab the example .hccap here http://hashcat.net/misc/example_hashes/hashcat.hccap
(pw is hashcat!)


And try with this command instead: oclHashcat64.exe -m 2500 hashcat.hccap -a 3 ?d?d?d?d?d?d?d?d --keyspace

D:\Network\hashcat\oclHashcat-1.37>oclHashcat64.exe -m 2500 hashcat.hccap -a 3 ?d?d?d?d?d?d?d?d --keyspace

oclHashcat v1.37 starting...

10000000


Easy peasy.
#3
Lemon squeezy =)
Thanks!
#4
But WTF?
When I am trying to calculate keyspace for passwords.txt which contains 26 words (for example) I am getting 26:
./oclHashcat64.bin -m 2500 --outfile out.txt hash.hccap -a 1 passwords.txt passwords.txt -j '$-' -k '$!' --keyspace
>oclHashcat v1.37 starting...
>
>26

I assumed that the result will be 26 * 26 = 676.
Is it oclHashcat optimisation?
#5
see https://hashcat.net/wiki/doku.php?id=fre...a_keyspace

Quote:-a 1 – number of words in left_wordlist
#6
Thanks, atom