So when I was using bruteforce with aircrack... I was getting like 3000 keys per second...
But when I used hascat to bruteforce... im getting 24 million words per second?? Is it even possible lol??
But it still says estimated 10 years to test all 10 letter passwords... all numbers small and big letters lol
Forum Thread: Hashcat 24m??
- Hot
- Active
-
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
1 mo ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
1 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
2 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
3 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
4 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
5 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
5 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
6 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
6 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
7 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
9 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
9 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
9 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
9 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
9 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
9 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
10 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
11 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
11 mo ago
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
How To: Intercept Images from a Security Camera Using Wireshark
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
How To: Use Kismet to Watch Wi-Fi User Activity Through Walls
-
Hack Like a Pro: How to Find Directories in Websites Using DirBuster
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
How To: Dox Anyone
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Set Up a Wi-Fi Spy Camera with an ESP32-CAM
-
How To: Hack Android Using Kali (Remotely)
-
How To: Use the Chrome Browser Secure Shell App to SSH into Remote Devices
-
How To: Bypass File Upload Restrictions on Web Apps to Get a Shell
-
Hack Like a Pro: Cryptography Basics for the Aspiring Hacker
-
How To: Scan, Fake & Attack Wi-Fi Networks with the ESP8266-Based WiFi Deauther
-
How To: Intercept & Analyze LAN Traffic with a Packet Squirrel & Wireshark
10 Responses
If I'm doing my math right (10 #s + 26 lower + 26 upper)^10 then you would have 839,299,365,868,340,224 possible password combinations.
Might help to post a screenshot. The hashcat speeds can be confusing, especially since they're different between hashcat vs. oclhashcat.
But as an FYI, pure brute forcing a WPA hash is never going to get you anywhere. WPA/WPA2 is one of the most computationally-intensive hashes to crack. This means that your computer has to work harder to test each potential password, slowing down the whole process.
You'd also be surprised how many people never change the default password -- which is good for us in many contexts, but not for wireless. Newer routers have default passwords of 12+ and are a random jumble of letters and symbols. No one is going to crack that (unless maybe they have some sort of massive GPU farm).
But I saw some statuses by pressing enter... it was actually 24 million per sec... and not ocl... its just normal hashcat... im going to get oclhascat and see how much I get on that....
Just one thing im worried about... dies this speed affect my pc?? Like slow it down even after restart or damage to hardware or such? ?
Well, the fastest WPA speed posted in the ocl benchmarks is 2233 kH/s, which is 2,233,000 tries per second. So I doubt you are getting 12 times that much. (We are talking about WPA/WPA2 hashes, right? Because 24 M/s is definitely possible with other hash types.)
If you plan on leaving hashcat running for days and days and days, yes it will probably shorten the lifespan of your computer.
When using Hashcat, your computer should be fine as long as its fan and cooling system are adequately working. If you overheat, your computer should shut itself down automatically.
When using oclHashcat, you want to watch out for overclocking your GPU. This shouldn't be a problem because oclHashcat has checks built in to watch out for this, but if you're still getting too hot you can customize the threshold.
In speed per sec... it says -- something, 24.56 M words... it does any and all number till 9 digits in a minute.. and yea its wpa/wpa2
How to see if my computer is getting ovwrheated and what is the limit??
Can you post the command you used? And a screenshot of the status (or copy and paste it)
hashcat -m 2500 --pw-min=8 -a 3 '/root/hack-01.cap' -n 512 -1 ?l?d ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1
Initializing hashcat v0.49 with 512 threads and 32mb segment-size...
Skipping file: (null) (invalid eapol size)
Added hashes from file /root/hack-01.cap: 0 (0 salts)
NOTE: press enter for status-screen
Input.Mode: Mask (?1?1?1?1?1?1?1?1) 8
Index.....: 0/1 (segment), 2821109907456 (words), 0 (bytes)
Recovered.: 0/0 hashes, 0/0 salts
Speed/sec.: - plains, 25.75M words
Progress..: 18096752/2821109907456 (0.00%)
Running...: --:--:--:--
Estimated.: 01:06:26:15
Input.Mode: Mask (?1?1?1?1?1?1?1?1) 8
Index.....: 0/1 (segment), 2821109907456 (words), 0 (bytes)
Recovered.: 0/0 hashes, 0/0 salts
Speed/sec.: - plains, 26.73M words
Progress..: 51820968/2821109907456 (0.00%)
Running...: 00:00:00:01
Estimated.: 01:05:18:45
^CTo restore Session use Parameter -s
Also... experienced a little lag at start when i started my laptop...
Ah, ok. You're using an invalid cap file, so hashcat wasn't actually trying to crack anything.
I'm guessing that the "work" it's doing is just generating character combinations, kind of like if you ran crunch with the same configuration.
You need to convert the pcap/cap file to an .hccap file. You can do this by uploading it here, but I suggest you do it manually and clean it first.
From Kali, first run this:
wpaclean hack-01.cap cleanhack-01.cap
(Note that the order is reversed: current file name first, then new file name)
Then run this on the clean cap file:
aircrack-ng cleanhack-01.cap -J newhack-01.hccap
(make sure you use a capital "J")
To monitor your temperature, you'll have to install software. There are lots of free programs to do it, but I've never used one so I can't recommend any. Here's a list, though. The only one I've heard of before is SpeedFan:
http://listoffreeware.com/best-free-cpu-temperature-monitor-software-windows/
Generally you don't want your CPU to run above 60C for long periods of time, but each CPU has different guidelines. You should be able to look yours up here: http://www.cpu-world.com/
Whatif I use oclhashcat and thus use my gpu??
Thnx!! :);)
Share Your Thoughts