Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: WPA .Caps Wanted !
Post: RE: WPA .Caps Wanted !

the rainbow tables you are talking about create the PMK only. this is the slow part in cracking the WPA. but there is another part, the calculation of the PTK. this part is fast (~10 iterations) and t...
atom General Help 6 14,843 11-20-2011, 10:56 AM
    Thread: WPA 10 digit phone number using area code dictionary and 7 digit mask? HOW?
Post: RE: WPA 10 digit phone number using area code dict...

If you want to verify the password candidates match your expectations you can use latest beta version, it will show them to you in the status view or use --stdout
atom hashcat 12 16,742 10-21-2016, 07:01 PM
    Thread: WPA 10 digit phone number using area code dictionary and 7 digit mask? HOW?
Post: RE: WPA 10 digit phone number using area code dict...

Do you have any empty lines in the masks/areacodes_no-tabs.hcmask? Note you can not use --stdout in combination with a hash, so you also need to remove the hccap-combined3/combined3.hccap
atom hashcat 12 16,742 10-25-2016, 11:00 AM
    Thread: WPA 27k/s on a GTX770 is that low?
Post: RE: WPA 27k/s on a GTX770 is that low?

AMD is much stronger than NV because they have some low level instructions that are good for crypto and oclHashcat can make use of this.
atom Very old oclHashcat-plus Support 3 11,065 11-30-2013, 08:52 AM
    Thread: WPA : print the BSSID as well ?
Post: RE: WPA : print the BSSID as well ?

I can see the need for it, still it's a rare case. I will add it if there's some time left
atom General Help 4 7,892 05-27-2014, 06:11 PM
    Thread: WPA Combination attack (skipping passwords)
Post: RE: WPA Combination attack (skipping passwords)

Since -a1 (and -a6 and -a7 as well) change the length of the password candidate on gpu, there's no way to skip them anymore. If you want them skipped, use combinator.bin from hashcat-utils and pipe
atom Old oclHashcat Support 2 5,123 03-30-2015, 11:07 AM
    Thread: WPA Hashing Question
Post: RE: WPA Hashing Question

It looks like you are using an outdated oclHashcat-plus. Latest versions just print "> 10 Years", not "66 years..."
atom Very old oclHashcat-plus Support 8 14,723 11-01-2012, 09:28 AM
    Thread: WPA mac addresses "flip flopped" in potfile
Post: RE: WPA mac addresses "flip flopped" in potfile

Please add an issue on github for it. I'm closing this here
atom hashcat 1 2,602 11-14-2016, 09:33 PM
    Thread: WPA masks
Post: RE: WPA masks

you can pipe if you want: ./crunch 10 10 -f charset.lst hex-lower -i -d 2 -b 100GB | ./oclHashcat-plus64.bin -m 2500 -n 8 --gpu-loops=45 -1 abcdef?d /pentest/passwords/oclhashcat+/mynetworkcap.hccap
atom General Help 6 14,434 12-14-2012, 03:20 PM
    Thread: WPA minimal len
Post: RE: WPA minimal len

yes, thats one of the things going into the rejection counter
atom Very old oclHashcat-plus Support 1 5,010 01-28-2012, 10:25 AM
    Thread: WPA R9 290X or 7990?
Post: RE: WPA R9 290X or 7990?

290x as it's the fastest single gpu card. dual gpu cards like 7990 or 295x create more problems with heat than you want to think of
atom Hardware 1 4,918 08-07-2014, 10:59 AM
    Thread: WPA Rule based
Post: RE: WPA Rule based

About rejected, please read this: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#what_means_rejected_in_the_status_view The --restore works automatically, there's no need to use --...
atom hashcat 1 2,791 02-09-2017, 11:01 AM
    Thread: WPA speed problem comparing to v1.31
Post: RE: WPA speed problem comparing to v1.31

1.32 uses AMP kernel (candidates calculated on GPU), therefore you need bigger wordlists as with 1.31.
atom Old oclHashcat Support 8 14,762 02-16-2015, 01:05 PM
    Thread: WPA speed problem comparing to v1.31
Post: RE: WPA speed problem comparing to v1.31

Well you can. If you really want to use small wordlists as before (and then adding rules), you can use hashcat in --stdout mode and pipe it to oclHashcat. In that case you will get the same speed with...
atom Old oclHashcat Support 8 14,762 02-18-2015, 05:29 PM
    Thread: WPA Strip, Clean and Convert Script
Post: RE: WPA Strip, Clean and Convert Script

@ Hash-IT : can you please update wpa/wpa2 wiki page and add some reference to this post?
atom User Contributions 18 48,951 11-16-2011, 12:29 PM
    Thread: WPA Strip, Clean and Convert Script
Post: RE: WPA Strip, Clean and Convert Script

can pyrit export to aircrack?
atom User Contributions 18 48,951 11-16-2011, 04:51 PM
    Thread: WPA Strip, Clean and Convert Script
Post: RE: WPA Strip, Clean and Convert Script

ok, thread closed.
atom User Contributions 18 48,951 11-20-2011, 10:53 AM
    Thread: wpa/2 flaws?
Post: RE: wpa/2 flaws?

There's no such weakness in PBKDF2
atom General Talk 2 3,183 05-13-2017, 02:46 PM
    Thread: wpa/wpa2 dedicated password cracking rig
Post: RE: wpa/wpa2 dedicated password cracking rig

There's no special hardware for WPA cracking. You need to stick to CPU/GPU.
atom Hardware 4 8,147 07-11-2016, 11:11 AM
    Thread: WPA/WPA2 dictionary attack doesn't work!
Post: RE: WPA/WPA2 dictionary attack doesn't work!

Try wpaclean (it's in aircrack-ng) before creating the hccap. Or if you used wpaclean already, try creating the hccap without using wpaclean before.
atom Old oclHashcat Support 2 4,958 05-16-2016, 01:40 PM