WPA2 key testing
#1
Hi,

I want to check that I'm doing WPA2 properly and see how long it'll take so I've captured my own WIFI handshake, obviously I know the password - AVBXVRWA.

I want to work out how long it should roughly take, how do I work out exactly how many iterations hashcat will go through to get there.

I know that total combinations are 28^8, but how do I do it for that specific password?

Assuming I use the mask ?u?u?u?u?u?u?u?u


Thanks in advance.
#2
Unless I missed something, you just answered your own question.
#3
I think he means at what exact point would AVBXVRWA be found? If you use the --markov-disable flag with your mask for classic brute-force then it should be found at around 3.25% "Progress:". How long your hardware takes to get there only you can tell us as you haven't mentioned what you've got. Benchmarking by running hashcat with "-b -m 2500" to determine hash rate.

If you don't use --markov-disable, you'll have to consult the source to see how markov chains are applied to determine when you'll get there...