Posts: 3
Threads: 2
Joined: Nov 2015
I can't find a full guide on how to successfully crack WPA/WPA2 using the CPU version of hashcat. I would greately appreciate it if anyone could tell me where I can find one. As I am new to hashcat, I also wanted to know what would happen when the right password is found and where would it be saved.
Posts: 230
Threads: 4
Joined: Aug 2015
Google "hashcat wpa tutorial" and go from there. There's even one on this site!!!
https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2
CPU version
more or less the same as GPU version except slower obviously.
Once you've actually read and understood these tutorials you'll know the difference between them.
Posts: 2,936
Threads: 12
Joined: May 2012
"Full guide" is code for "I don't want to read and study."
Posts: 25
Threads: 1
Joined: Nov 2015
(12-01-2015, 02:04 AM)epixoip Wrote: "Full guide" is code for "I don't want to read and study."
So true, so true...
There's so much information out there if you just know where/how to look:
http://lmgtfy.com/?q=cracking+wpa+using+hashcat
Posts: 3
Threads: 2
Joined: Nov 2015
(12-01-2015, 02:04 AM)epixoip Wrote: "Full guide" is code for "I don't want to read and study."
That's not true. I can only find information on oclHashcat but there is barely that much information on the CPU version of Hashcat.
Posts: 25
Threads: 1
Joined: Nov 2015
12-02-2015, 02:53 AM
(This post was last modified: 12-02-2015, 02:57 AM by wrigglingears.)
The usage of the CPU and GPU version of hashcat (in the case of WPA/WPA2 cracking) is almost identical. If you know how to use one for WPA cracking you will be able to use the other.
Also, when you get deeper, a 'full guide' or anything of that sort becomes increasingly difficult to find. Mostly you'll just have manuals for the individual programs like
https://hashcat.net/wiki/doku.php?id=hashcat, and then you work your way from there.
Posts: 20
Threads: 3
Joined: Oct 2014
just want to repeat that wpa cracking starts with wps, then dictionary attack fx.
http://wpa-sec.stanev.org/
then investigating your targets router etc......
and as they said its already out there just check youtube.....