Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Segmentation Fault when calcultaing keyspace for WPA
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hi,

I have an AMD GPU and wanted to calculate keyspace parameter for WPA and various attack modes.
I read this instruction, and trying to use command for WPA (-m 2500).
It works well with "-m 2611", but with "-m 2500" I am getting "Segmentation Fault (core dumped)" under Ubuntu and Exception under Windows.
Tried 1.37 and 1.36 versions of oclHashcat.


The same issue appears and under Ubuntu.
Benchmark and attacks works well.

Screenshots are in attachments.
Yeah, crashes for me too but then again the command makes no sense.

1. WPA mode expects a hashcat capture file (.hccap), not a wordlist or hashes file.
2. WPA passwords are a minimum of 8 characters in length

So grab the example .hccap here https://hashcat.net/misc/example_hashes/hashcat.hccap
(pw is hashcat!)


And try with this command instead: oclHashcat64.exe -m 2500 hashcat.hccap -a 3 ?d?d?d?d?d?d?d?d --keyspace

D:\Network\hashcat\oclHashcat-1.37>oclHashcat64.exe -m 2500 hashcat.hccap -a 3 ?d?d?d?d?d?d?d?d --keyspace

oclHashcat v1.37 starting...

10000000


Easy peasy.
Lemon squeezy =)
Thanks!
But WTF?
When I am trying to calculate keyspace for passwords.txt which contains 26 words (for example) I am getting 26:
./oclHashcat64.bin -m 2500 --outfile out.txt hash.hccap -a 1 passwords.txt passwords.txt -j '$-' -k '$!' --keyspace
>oclHashcat v1.37 starting...
>
>26

I assumed that the result will be 26 * 26 = 676.
Is it oclHashcat optimisation?
see https://hashcat.net/wiki/doku.php?id=fre...a_keyspace

Quote:-a 1 – number of words in left_wordlist
Thanks, atom