Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: oclHashcat exhausted immediatly when using long mask on WPA brute-force attack
Post: RE: oclHashcat exhausted immediatly when using lon...

I forgot to mention that oclHashcat has no problem when running a dictionary attack using a dictionary made of 26 characters keys following the same format. Code: -- oclHashcat64.bin -m 2500 10_cl...
0xd Old oclHashcat Support 3 7,701 11-25-2014, 07:54 PM
    Thread: oclHashcat exhausted immediatly when using long mask on WPA brute-force attack
Post: RE: oclHashcat exhausted immediatly when using lon...

I have to add that I have 4GB or RAM. My assumption is that, when using a mask, oclHashcat somehow tries to "reserve" the memory space for the entire possible dictionary for that mask. 8 charcaters...
0xd Old oclHashcat Support 3 7,701 11-26-2014, 10:16 AM
    Thread: oclHashcat exhausted immediatly when using long mask on WPA brute-force attack
Post: oclHashcat exhausted immediatly when using long ma...

Hello everyone, I'm trying to brute-force a 26 characters long WPA key, all characters are hexa and uppercase, no space no special character (for info this is the format of the Livebox WPA key, whi...
0xd Old oclHashcat Support 3 7,701 11-25-2014, 07:23 PM