Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Brute forcing 5-12 character WPA in practice ?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
impossible to have a 5 character WPA password, minimum length for that algorithm is 8 characters.

8x R9 290X will take an average of 2.66 years to brute force an 8-character alphanumeric password (no special characters), and over 5 years to exhaust the whole keyspace. so as you can see, brute force is largely not possible with WPA.
Most default passwords are not alphanumeric and in my experience, 90% of passwords given out by the ISP's are never changed by the user. You need to research what each ISP uses.

Most ISP's use

8 characters lower
8 characters upper
8 characters HEX
10 characters HEX
10 characters digits

I've had success with all of the above in reasonable timeframes. Below is a very good site for calculating time taken, just input your custom keys per second and calculate.

https://calc.opensecurityresearch.com/

Example:

4x 290X's at 200k/s would crack 8 characters lower OR upper in 3 days max. 1.5 days average.
the notion of an ISP handing out a wifi router is rather foreign to me. is this mostly practiced in Europe? the only ISP i know that does this in the US is AT&T, with their DSL gateways which have built-in wifi. well i guess mobile hotspots also have generated numeric passwords as well. anyway, 99.9999% of the access points i encounter are purchased by their owners who have created their own passwords for these devices. but i suppose ymmv.
(01-09-2014, 03:07 PM)epixoip Wrote: [ -> ]the notion of an ISP handing out a wifi router is rather foreign to me. is this mostly practiced in Europe? the only ISP i know that does this in the US is AT&T, with their DSL gateways which have built-in wifi. well i guess mobile hotspots also have generated numeric passwords as well. anyway, 99.9999% of the access points i encounter are purchased by their owners who have created their own passwords for these devices. but i suppose ymmv.

Wasn't aware of that.

With the UK at least, ISP's dish out routers with pre set keys.
Another newb question:

Is there any performance advantage (or even possible) to run oclHashcat on a Macbook pro that has an nvidia chipset as opposed to running hashcat on the cpu? In any operating system, I have osx mavericks, backtrack and win7 on this machine.
Scratch that last question. Until I get a mutli-GPU box purchased, I'm running hashcat on a supermicro server. Unfortunately it is in an ESXi server so I put a Linux virtual machine on it, and gave it access to all 8 cores on the machine.

Currently running a dictionary attack and I'm seeing the overall server pegged hard on CPU.

Input.Mode: Dict (rockyou.txt)
Index.....: 4/5 (segment), 3488132 (words), 33550343 (bytes)
Recovered.: 0/1 hashes, 0/1 salts
Speed/sec.: 5.60k plains, 5.60k words
Progress..: 2986168/3488132 (85.61%)
Running...: 00:00:08:53
Estimated.: 00:00:01:29



I'm curious, is this speed very slow ?
Yes it is, cracking using CPU's is very slow and not worth doing.

I get 420K / sec with two 7970's and a 7850.
(01-10-2014, 10:20 AM)futant Wrote: [ -> ]I'm curious, is this speed very slow ?

it is horrendously slow.
Pages: 1 2