Posts: 5,185
Threads: 230
Joined: Apr 2010
Wait, 62^12 = 0xE5720EE830681000 so it's close to an integer overflow but it's not overflowing. Therefore hashcat is not warning.
Cracking a random WPA password with length 12 with upper, lower and digits is not possible. But the key here is "random". If the password contains words (even scrambled) you may can crack it using a wordlist. Another possibility is if the password was not changed on the AP. In that case it just looks random, but it isn't. It then can be cracked using a keygenerator for that AP type.
Posts: 2,936
Threads: 12
Joined: May 2012
06-20-2017, 06:23 PM
(This post was last modified: 06-20-2017, 07:02 PM by epixoip.)
No, I don't think so.
http://www.wolframalpha.com/input/?i=is+...(2%5E64-1)
http://www.wolframalpha.com/input/?i=62%5E12+to+base+16 (click More under Other Data Types)
Quote:unsigned 64-bit integer | 00106830e80e72e5 (overflow: truncated to 64 bits)
unsigned 128-bit integer | 00106830e80e72e5ae00000000000000
Posts: 5,185
Threads: 230
Joined: Apr 2010
You're right! But hashcat is reporting the overflow correctly:
Integer overflow detected in keyspace of mask: ?1?1?1?1?1?1?1?1?1?1?1?1
(where -1 = ?d?l?u)
Posts: 5
Threads: 1
Joined: Jun 2017
(06-20-2017, 10:25 AM)atom Wrote: Wait, 62^12 = 0xE5720EE830681000 so it's close to an integer overflow but it's not overflowing. Therefore hashcat is not warning.
Cracking a random WPA password with length 12 with upper, lower and digits is not possible. But the key here is "random". If the password contains words (even scrambled) you may can crack it using a wordlist. Another possibility is if the password was not changed on the AP. In that case it just looks random, but it isn't. It then can be cracked using a keygenerator for that AP type.
Interesting. Im just testing it on my home router. It has the default password on it, which is just random upper-lower-numbers. Would you have any links or resources regarding AP keygens? I'd be interested in trying it.