Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Would appreciate assistance with forming correct command structure
Post: RE: Would appreciate assistance with forming corre...
ok, the keyspace would be:
95^6 [completely unknown characters] * 10 [possible positions for "3"] * 10 [possible positions for "4"] * 11 [possible positions for "5"] = 808601079687500
assuming all th... |
|
undeath |
hashcat
|
10 |
6,580 |
12-17-2017, 05:35 PM |
|
|
Thread: wpa &wpa2
Post: RE: wpa &wpa2
something's wrong with your setup. According to this benchmark (https://gist.github.com/epixoip/1f26f43e9036d9ce0eb8) a single Titan X should archive ~280k/s |
|
undeath |
Old oclHashcat Support
|
9 |
16,753 |
05-28-2015, 11:08 AM |
|
|
Thread: WPA crack not working in Windows Environment
Post: RE: WPA crack not working in Windows Environment
actually this sounds like a bug in the windows version (compiler bug?) |
|
undeath |
Old oclHashcat Support
|
10 |
25,133 |
10-29-2014, 09:27 PM |
|
|
Thread: WPA help
Post: RE: WPA help
standard wpa(2) is mode 2500. Unless you know what PMK or PMKID means you don't need them. |
|
undeath |
General Talk
|
1 |
978 |
12-11-2019, 01:00 AM |
|
|
Thread: WPA MAC Privacy
Post: RE: WPA MAC Privacy
if hashcat can decrypt it so can anyone else. |
|
undeath |
Feature Requests
|
8 |
16,481 |
12-09-2012, 07:24 PM |
|
|
Thread: WPA MAC Privacy
Post: RE: WPA MAC Privacy
What i was referring to is that everyone is able to reverse engineer the binary executable and figure out how the file gets decrypted. It's about the same level of security as locking your car and hid... |
|
undeath |
Feature Requests
|
8 |
16,481 |
12-10-2012, 01:39 AM |
|
|
Thread: WPA masks
Post: RE: WPA masks
For WPA the speed difference is irrelevant. Also hashcat cannot further filter the candidates generated by the mask generator. |
|
undeath |
General Help
|
6 |
14,431 |
12-14-2012, 04:35 PM |
|
|
Thread: WPA restarting ten digit bruteforce
Post: RE: WPA restarting ten digit bruteforce
oclhashcat-plus does not have any option to resume. |
|
undeath |
General Talk
|
3 |
9,677 |
07-26-2012, 07:31 PM |
|
|
Thread: Wpa speed dropping
Post: RE: Wpa speed dropping
possibly throttling because of bad cooling |
|
undeath |
General Talk
|
6 |
4,732 |
08-01-2018, 07:54 PM |
|
|
Thread: WPA speed problem comparing to v1.31
Post: RE: WPA speed problem comparing to v1.31
Mem5 Wrote: (02-16-2015, 11:26 PM)
--
OK, but the 35% rejected was because passwords length were not between 8-64 chars ; so do you mean that v1.32 can test password 64 chars ?
--
No. Previous vers... |
|
undeath |
Old oclHashcat Support
|
8 |
14,758 |
02-17-2015, 03:30 PM |
|
|
Thread: Wpa/Wpa2 dictionary attack is very slow after the latest update
Post: RE: Wpa/Wpa2 dictionary attack is very slow after ...
current version is 4.1.0
https://github.com/hashcat/hashcat/releases/download/v4.1.0/hashcat-4.1.0.7z |
|
undeath |
hashcat
|
9 |
6,762 |
02-22-2018, 09:35 PM |
|
|
Thread: Wpa/Wpa2 dictionary attack is very slow after the latest update
Post: RE: Wpa/Wpa2 dictionary attack is very slow after ...
so, are you on version 4.1.0 yet? |
|
undeath |
hashcat
|
9 |
6,762 |
02-22-2018, 10:13 PM |
|
|
Thread: WPA/WPA2 in hashcat
Post: RE: WPA/WPA2 in hashcat
isn't aircrack good enough for such easy tasks? I think it accepts stdin wordlists, so this is easy to deal with in combination with maskprocessor. |
|
undeath |
Feature Requests
|
13 |
32,539 |
01-10-2013, 04:45 PM |
|
|
Thread: WPA/WPA2 using PMK 2501
Post: RE: WPA/WPA2 using PMK 2501
Please don't hijack unrelated threads. And why don't you try to run the commands instead of asking if you can? |
|
undeath |
hashcat
|
3 |
3,234 |
08-06-2018, 10:12 PM |
|
|
Thread: WPA/WPA2 which hashcat, which rules ?
Post: RE: WPA/WPA2 which hashcat, which rules ?
if you want to crack WPA on cpu you have to use aircrack. |
|
undeath |
Very old oclHashcat-plus Support
|
9 |
23,914 |
01-10-2013, 04:41 PM |
|
|
Thread: WPA/WPA2: Making it feasable?
Post: RE: WPA/WPA2: Making it feasable?
if it is truly random no. |
|
undeath |
General Help
|
2 |
5,556 |
05-06-2014, 10:35 PM |
|
|
Thread: WPA2 Bruteforce.
Post: RE: WPA2 Bruteforce.
If you need to match such password policies you will need to use PACK https://thesprawl.org/projects/pack/ |
|
undeath |
Old oclHashcat Support
|
2 |
6,379 |
07-17-2015, 03:01 PM |
|
|
Thread: WPA2 crack rules
Post: RE: WPA2 crack rules
That's quite tricky. *hashcat has no functionality to archive this. You can try to use https://www.thesprawl.org/projects/pack/ to generate some mask files or try creating a specific wordlist for this... |
|
undeath |
Old oclHashcat Support
|
6 |
9,333 |
10-13-2015, 12:46 PM |
|
|
Thread: WPA2 Enterprise ?
Post: RE: WPA2 Enterprise ?
WPA Enterprise uses IEEE 802.1X. Most widespread implementations are based on TLS. |
|
undeath |
General Help
|
3 |
7,123 |
06-22-2014, 12:44 PM |
|
|
Thread: Wrong Time Estimated with -w 4 parameter
Post: RE: Wrong Time Estimated with -w 4 parameter
There can be lots of reasons for this. Some other program may have used the GPU within those four hours, leading to a temporary speed drop. Or maybe thermal throttling kicked in, slowing the cards dow... |
|
undeath |
hashcat
|
4 |
2,730 |
09-04-2018, 04:20 PM |