Cpu + gpu for wpa/wpa2 how to set ?
#11
Quote:Aircrack-ng 1.1 [00:06:38] 210300 keys tested (493.26 k/s) KEY FOUND!

Quote:oclhc-plus Status.......: Cracked
Time.Running.: 1 min, 50 secs
Progress.....: 273244/3160121 (8.65%)

1 min, 50 secs much better than 6 min 38 secs Smile
#12
Yes.

But:
1.aircrack-ng with 535.90 k/s use CPU (cpu AMD Athlon X2 4850e 2.5GHz 2 x 512KB L2)
2.oclhc-plus with 2786 c/s Real use GPU (gpu GeForce 8200 + GeForce GT 220 )

and Rolf say :
(10-09-2011, 04:26 PM)Rolf Wrote: 2786 > 540.
#13
aircrack-ng calls it k/s (keys/sec) while oclHashcat-plus call is c/s (cracks/sec) but its the same entity.
#14
I see that recovermypass use oclHashcat for recover wpa/wpa2, is this site related with this ?
I have one world list 20+gb and how to set rules to list all 8+ and all password in that word list ?
#15
(10-14-2011, 07:09 PM)mr008 Wrote: I see that recovermypass use oclHashcat for recover wpa/wpa2, is this site related with this ?
I have one world list 20+gb and how to set rules to list all 8+ and all password in that word list ?
It's not clear what you want but oclhashcat-plus will skip the words that are less than 8 characters. However, it would be wise to make another dictionary containing only the 8+ words. To do that, there are many tools. The one I personally like is ULM.

#16
this is totally unneccesary since oclHashcat-plus automatically skips all passwords < 8 for WPA/WPA2 cracking. thats one thing of what the skip counter is about.
#17
(10-14-2011, 10:04 PM)atom Wrote: this is totally unneccesary since oclHashcat-plus automatically skips all passwords < 8 for WPA/WPA2 cracking. thats one thing of what the skip counter is about.

Yes, but what about the passwords who have 16+ letters 18,19,20... in world list like "password123password" , is oclHashcat-plus automatically skips this ?

I find this code cudaHashcat-plus32.exe --hash-type 2500 --attack-mode 4 --perm-min 1 --perm-max 16 file.hccap wpa.txt but still 16 is max
#18
yes, because they are not supported to crack. its a limitation.
#19
Be good if have limitation 25+, but default to be 16
I put passwordspro.rule and i got this:
Hash.Type....: WPA/WPA2
Time.Running.: 1 min, 26 secs
Time.Left....: 56 years, 98 days
Progress.....: 381580/3551533713036 (0.00%)


In windows i exit from cmd, accidentally pressed X and all gone, not have options to remember how much key(letters) from dictionary tested ?
#20
no, you cant restore in oclHashcat-plus