Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: how to Bruteforce wpa/wpa2 in GUI mode
Post: RE: how to Bruteforce wpa/wpa2 in GUI mode
36 ^ 8 = 2821109907456 combinations. if you gpu (like my hd6990) makes ~190 khash/s its 14847946 seconds -> 171 days. if you say chances are 50% percent you crack it before full keyspace was scanned, ... |
|
atom |
Very old oclHashcat-plus Support
|
10 |
40,078 |
02-23-2012, 11:39 AM |
|
|
Thread: how to Bruteforce wpa/wpa2 in GUI mode
Post: RE: how to Bruteforce wpa/wpa2 in GUI mode
|
atom |
Very old oclHashcat-plus Support
|
10 |
40,078 |
02-23-2012, 05:08 PM |
|
|
Thread: how to Bruteforce wpa/wpa2 in GUI mode
Post: RE: how to Bruteforce wpa/wpa2 in GUI mode
yeah, they do that. its called "random salt" even if this sounds wrong from a hash-crackers view. however, oclHashcat does not support. i do not believe in this technique. |
|
atom |
Very old oclHashcat-plus Support
|
10 |
40,078 |
02-24-2012, 08:06 AM |
|
|
Thread: How to bruteforce?
Post: RE: How to bruteforce?
you guys read this? https://hashcat.net/wiki/brute_force_in_oclhashcat_plus |
|
atom |
Very old oclHashcat-plus Support
|
24 |
63,022 |
11-16-2011, 12:32 PM |
|
|
Thread: How to bruteforce?
Post: RE: How to bruteforce?
also note the maximum supported password plaintext length is 15 and the minimum for WPA is 8. |
|
atom |
Very old oclHashcat-plus Support
|
24 |
63,022 |
11-18-2011, 10:39 AM |
|
|
Thread: How to bruteforce?
Post: RE: How to bruteforce?
this is not about WPA, this applies to all algorithms. if the password is secure, this means long and with full charset, then nothing in the world can crack it. fortionally people do not use secure pa... |
|
atom |
Very old oclHashcat-plus Support
|
24 |
63,022 |
11-19-2011, 10:53 AM |
|
|
Thread: How to bruteforce?
Post: RE: How to bruteforce?
check out hashcats attack modes: https://hashcat.net/wiki/doku.php#attack_modes
also check out hashcat-utils: https://hashcat.net/wiki/hashcat_utils
if you gained some experience how to use these mode... |
|
atom |
Very old oclHashcat-plus Support
|
24 |
63,022 |
11-20-2011, 10:58 AM |
|
|
Thread: How to bruteforce?
Post: RE: How to bruteforce?
much faster. you can meassure yourself with the "time" command. point out the results to /dev/null to avoid influences from hdd/apps/whatever. i bet req.bin wil be 1000 times faster than 4 piped egrep... |
|
atom |
Very old oclHashcat-plus Support
|
24 |
63,022 |
11-20-2011, 05:04 PM |
|
|
Thread: How to bruteforce?
Post: RE: How to bruteforce?
|
atom |
Very old oclHashcat-plus Support
|
24 |
63,022 |
01-06-2012, 06:36 PM |
|
|
Thread: How to calc (md5(md5($pwd).$salt) ?
Post: RE: How to calc (md5(md5($pwd).$salt) ?
|
atom |
Old hashcat Support
|
4 |
9,059 |
08-23-2015, 12:34 PM |
|
|
Thread: How to choose the most effective command
Post: RE: How to choose the most effective command
|
atom |
hashcat
|
2 |
3,144 |
11-29-2016, 12:42 PM |
|
|
Thread: How to compare speeds between CPU and GPU hashcats
Post: RE: How to compare speeds between CPU and GPU hash...
The GPU version is faster |
|
atom |
General Help
|
1 |
5,097 |
09-30-2012, 07:44 PM |
|
|
Thread: How to configure mask attack
Post: RE: How to configure mask attack
This is simply not possible because of the salt (ESSID) that is used by WPA/WPA2. |
|
atom |
General Help
|
5 |
16,696 |
12-23-2012, 02:25 PM |
|
|
Thread: how to configure this in OCLhashcat?
Post: RE: how to configure this in OCLhashcat?
While this will work it will run very very very slow because the 4 chars are static. To make any reasonable use of GPU you need to give it some work to run on GPU kernel.
So you better get oclHashcat... |
|
atom |
General Help
|
3 |
6,683 |
12-08-2012, 08:16 PM |
|
|
Thread: How to convert an IgHashGpu command line in olchashcat
Post: RE: How to convert an IgHashGpu command line in ol...
sl3 cracking not yet supported |
|
atom |
Very old oclHashcat-lite Support
|
11 |
28,403 |
03-08-2011, 11:33 PM |
|
|
Thread: How to convert an IgHashGpu command line in olchashcat
Post: RE: How to convert an IgHashGpu command line in ol...
no, it is limited to 15 chars (for optimization reasons) but sl3 requires 24 chars |
|
atom |
Very old oclHashcat-lite Support
|
11 |
28,403 |
03-09-2011, 10:37 AM |
|
|
Thread: How to convert an IgHashGpu command line in olchashcat
Post: RE: How to convert an IgHashGpu command line in ol...
yes, oclHashcat-lite version will handle up to 48 chars in salted mode |
|
atom |
Very old oclHashcat-lite Support
|
11 |
28,403 |
03-10-2011, 11:12 AM |
|
|
Thread: How to convert an IgHashGpu command line in olchashcat
Post: RE: How to convert an IgHashGpu command line in ol...
it is under development. the command in oclHashcat-lite must be rewritten to:
./oclHashcat-lite64.bin 1346FE139958E354FFCD75821E0791E1EF359459:003542250356567600 -1 00010203040506070809 -m 103 --hex-... |
|
atom |
Very old oclHashcat-lite Support
|
11 |
28,403 |
03-11-2011, 03:15 PM |
|
|
Thread: how to crack multiple hashtype in the same time
Post: RE: how to crack multiple hashtype in the same ti...
Cracking multiple hashtypes at the same time is not supported |
|
atom |
hashcat
|
1 |
3,478 |
03-08-2017, 10:00 AM |
|
|
Thread: how to crack .pcap
Post: RE: how to crack .pcap
You mean for WPA? https://hashcat.net/cap2hccapx/ |
|
atom |
hashcat
|
2 |
6,445 |
02-28-2017, 09:33 PM |