Posts: 5,185
Threads: 230
Joined: Apr 2010
Quote:Aircrack-ng 1.1 [00:06:38] 210300 keys tested (493.26 k/s) KEY FOUND!
Quote:oclhc-plus Status.......: Cracked
Time.Running.: 1 min, 50 secs
Progress.....: 273244/3160121 (8.65%)
1 min, 50 secs much better than 6 min 38 secs
Posts: 30
Threads: 4
Joined: Oct 2011
10-12-2011, 05:03 PM
(This post was last modified: 10-12-2011, 05:07 PM by mr008.)
Yes.
But:
1.aircrack-ng with 535.90 k/s use CPU (cpu AMD Athlon X2 4850e 2.5GHz 2 x 512KB L2)
2.oclhc-plus with 2786 c/s Real use GPU (gpu GeForce 8200 + GeForce GT 220 )
and Rolf say :
(10-09-2011, 04:26 PM)Rolf Wrote: 2786 > 540.
Posts: 5,185
Threads: 230
Joined: Apr 2010
aircrack-ng calls it k/s (keys/sec) while oclHashcat-plus call is c/s (cracks/sec) but its the same entity.
Posts: 30
Threads: 4
Joined: Oct 2011
10-14-2011, 07:09 PM
(This post was last modified: 10-14-2011, 07:10 PM by mr008.)
I see that recovermypass use oclHashcat for recover wpa/wpa2, is this site related with this ?
I have one world list 20+gb and how to set rules to list all 8+ and all password in that word list ?
Posts: 621
Threads: 57
Joined: May 2010
10-14-2011, 09:32 PM
(This post was last modified: 10-14-2011, 09:32 PM by mastercracker.)
(10-14-2011, 07:09 PM)mr008 Wrote: I see that recovermypass use oclHashcat for recover wpa/wpa2, is this site related with this ?
I have one world list 20+gb and how to set rules to list all 8+ and all password in that word list ?
It's not clear what you want but oclhashcat-plus will skip the words that are less than 8 characters. However, it would be wise to make another dictionary containing only the 8+ words. To do that, there are many tools. The one I personally like is ULM.
Posts: 5,185
Threads: 230
Joined: Apr 2010
this is totally unneccesary since oclHashcat-plus automatically skips all passwords < 8 for WPA/WPA2 cracking. thats one thing of what the skip counter is about.
Posts: 30
Threads: 4
Joined: Oct 2011
10-14-2011, 11:45 PM
(This post was last modified: 10-15-2011, 12:08 AM by mr008.)
(10-14-2011, 10:04 PM)atom Wrote: this is totally unneccesary since oclHashcat-plus automatically skips all passwords < 8 for WPA/WPA2 cracking. thats one thing of what the skip counter is about.
Yes, but what about the passwords who have 16+ letters 18,19,20... in world list like "password123password" , is oclHashcat-plus automatically skips this ?
I find this code cudaHashcat-plus32.exe --hash-type 2500 --attack-mode 4 --perm-min 1 --perm-max 16 file.hccap wpa.txt but still 16 is max
Posts: 5,185
Threads: 230
Joined: Apr 2010
yes, because they are not supported to crack. its a limitation.
Posts: 30
Threads: 4
Joined: Oct 2011
10-15-2011, 12:45 AM
(This post was last modified: 10-15-2011, 02:10 AM by mr008.)
Be good if have limitation 25+, but default to be 16
I put passwordspro.rule and i got this:
Hash.Type....: WPA/WPA2
Time.Running.: 1 min, 26 secs
Time.Left....: 56 years, 98 days
Progress.....: 381580/3551533713036 (0.00%)
In windows i exit from cmd, accidentally pressed X and all gone, not have options to remember how much key(letters) from dictionary tested ?
Posts: 5,185
Threads: 230
Joined: Apr 2010
no, you cant restore in oclHashcat-plus