So when I was using bruteforce with aircrack... I was getting like 3000 keys per second...
But when I used hascat to bruteforce... im getting 24 million words per second?? Is it even possible lol??
But it still says estimated 10 years to test all 10 letter passwords... all numbers small and big letters lol
Forum Thread: Hashcat 24m??
- Hot
- Active
-
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
2 days ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 2 Replies
3 wks ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
3 wks ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
2 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
2 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
2 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
3 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
3 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
3 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
3 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
3 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
4 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
4 mo ago -
Forum Thread: How to Run and Install Kali Linux on a Chromebook 18 Replies
5 mo ago -
Forum Thread: How to Find Admin Panel Page of a Website? 13 Replies
6 mo ago -
Forum Thread: can i run kali lenux in windows 10 without reboting my computer 4 Replies
6 mo ago -
Forum Thread: How to Hack School Website 11 Replies
6 mo ago -
Forum Thread: Make a Phishing Page for Harvesting Credentials Yourself 8 Replies
6 mo ago -
Forum Thread: Creating an Completely Undetectable Executable in Under 15 Minutes! 38 Replies
7 mo ago -
Forum Thread: Hacking with Ip Only Part [1] { by : Mohamed Ahmed } 5 Replies
8 mo ago
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Hack Apache Tomcat via Malicious WAR File Upload
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
BT Recon: How to Snoop on Bluetooth Devices Using Kali Linux
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
How To: Beginner's Guide to OWASP Juice Shop, Your Practice Hacking Grounds for the 10 Most Common Web App Vulnerabilities
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Dox Anyone
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
How To: Find Passwords in Exposed Log Files with Google Dorks
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2019
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
-
Hack Like a Pro: How to Find Directories in Websites Using DirBuster
-
How To: Use Command Injection to Pop a Reverse Shell on a Web Server
-
How To: Write an XSS Cookie Stealer in JavaScript to Steal Passwords
-
How To: Extract Bitcoin Wallet Addresses & Balances from Websites with SpiderFoot CLI
10 Responses
If I'm doing my math right (10 #s + 26 lower + 26 upper)^10 then you would have 839,299,365,868,340,224 possible password combinations.
Might help to post a screenshot. The hashcat speeds can be confusing, especially since they're different between hashcat vs. oclhashcat.
But as an FYI, pure brute forcing a WPA hash is never going to get you anywhere. WPA/WPA2 is one of the most computationally-intensive hashes to crack. This means that your computer has to work harder to test each potential password, slowing down the whole process.
You'd also be surprised how many people never change the default password -- which is good for us in many contexts, but not for wireless. Newer routers have default passwords of 12+ and are a random jumble of letters and symbols. No one is going to crack that (unless maybe they have some sort of massive GPU farm).
But I saw some statuses by pressing enter... it was actually 24 million per sec... and not ocl... its just normal hashcat... im going to get oclhascat and see how much I get on that....
Just one thing im worried about... dies this speed affect my pc?? Like slow it down even after restart or damage to hardware or such? ?
Well, the fastest WPA speed posted in the ocl benchmarks is 2233 kH/s, which is 2,233,000 tries per second. So I doubt you are getting 12 times that much. (We are talking about WPA/WPA2 hashes, right? Because 24 M/s is definitely possible with other hash types.)
If you plan on leaving hashcat running for days and days and days, yes it will probably shorten the lifespan of your computer.
When using Hashcat, your computer should be fine as long as its fan and cooling system are adequately working. If you overheat, your computer should shut itself down automatically.
When using oclHashcat, you want to watch out for overclocking your GPU. This shouldn't be a problem because oclHashcat has checks built in to watch out for this, but if you're still getting too hot you can customize the threshold.
In speed per sec... it says -- something, 24.56 M words... it does any and all number till 9 digits in a minute.. and yea its wpa/wpa2
How to see if my computer is getting ovwrheated and what is the limit??
Can you post the command you used? And a screenshot of the status (or copy and paste it)
hashcat -m 2500 --pw-min=8 -a 3 '/root/hack-01.cap' -n 512 -1 ?l?d ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1
Initializing hashcat v0.49 with 512 threads and 32mb segment-size...
Skipping file: (null) (invalid eapol size)
Added hashes from file /root/hack-01.cap: 0 (0 salts)
NOTE: press enter for status-screen
Input.Mode: Mask (?1?1?1?1?1?1?1?1) 8
Index.....: 0/1 (segment), 2821109907456 (words), 0 (bytes)
Recovered.: 0/0 hashes, 0/0 salts
Speed/sec.: - plains, 25.75M words
Progress..: 18096752/2821109907456 (0.00%)
Running...: --:--:--:--
Estimated.: 01:06:26:15
Input.Mode: Mask (?1?1?1?1?1?1?1?1) 8
Index.....: 0/1 (segment), 2821109907456 (words), 0 (bytes)
Recovered.: 0/0 hashes, 0/0 salts
Speed/sec.: - plains, 26.73M words
Progress..: 51820968/2821109907456 (0.00%)
Running...: 00:00:00:01
Estimated.: 01:05:18:45
^CTo restore Session use Parameter -s
Also... experienced a little lag at start when i started my laptop...
Ah, ok. You're using an invalid cap file, so hashcat wasn't actually trying to crack anything.
I'm guessing that the "work" it's doing is just generating character combinations, kind of like if you ran crunch with the same configuration.
You need to convert the pcap/cap file to an .hccap file. You can do this by uploading it here, but I suggest you do it manually and clean it first.
From Kali, first run this:
wpaclean hack-01.cap cleanhack-01.cap
(Note that the order is reversed: current file name first, then new file name)
Then run this on the clean cap file:
aircrack-ng cleanhack-01.cap -J newhack-01.hccap
(make sure you use a capital "J")
To monitor your temperature, you'll have to install software. There are lots of free programs to do it, but I've never used one so I can't recommend any. Here's a list, though. The only one I've heard of before is SpeedFan:
http://listoffreeware.com/best-free-cpu-temperature-monitor-software-windows/
Generally you don't want your CPU to run above 60C for long periods of time, but each CPU has different guidelines. You should be able to look yours up here: http://www.cpu-world.com/
Whatif I use oclhashcat and thus use my gpu??
Thnx!! :);)
Share Your Thoughts