Is this WPA2 Password uncrackable?
#11
Wait, 62^12 = 0xE5720EE830681000 so it's close to an integer overflow but it's not overflowing. Therefore hashcat is not warning.

Cracking a random WPA password with length 12 with upper, lower and digits is not possible. But the key here is "random". If the password contains words (even scrambled) you may can crack it using a wordlist. Another possibility is if the password was not changed on the AP. In that case it just looks random, but it isn't. It then can be cracked using a keygenerator for that AP type.
#12
No, I don't think so.

http://www.wolframalpha.com/input/?i=is+...(2%5E64-1)

http://www.wolframalpha.com/input/?i=62%5E12+to+base+16 (click More under Other Data Types)

Quote:unsigned 64-bit integer | 00106830e80e72e5 (overflow: truncated to 64 bits)
unsigned 128-bit integer | 00106830e80e72e5ae00000000000000
#13
You're right! But hashcat is reporting the overflow correctly:

Integer overflow detected in keyspace of mask: ?1?1?1?1?1?1?1?1?1?1?1?1

(where -1 = ?d?l?u)
#14
(06-20-2017, 10:25 AM)atom Wrote: Wait, 62^12 = 0xE5720EE830681000 so it's close to an integer overflow but it's not overflowing. Therefore hashcat is not warning.

Cracking a random WPA password with length 12 with upper, lower and digits is not possible. But the key here is "random". If the password contains words (even scrambled) you may can crack it using a wordlist. Another possibility is if the password was not changed on the AP. In that case it just looks random, but it isn't. It then can be cracked using a keygenerator for that AP type.

Interesting. Im just testing it on my home router. It has the default password on it, which is just random upper-lower-numbers. Would you have any links or resources regarding AP keygens? I'd be interested in trying it.