Tagged: hashcat
- This topic has 3 replies, 2 voices, and was last updated 4 years, 2 months ago by Diego Pérez.
- AuthorPosts
- October 15, 2020 at 10:15 am #47006Marek KovalcikParticipant
Hello,
I have a problem with cracking WPA2 password with HashCat. I have captured handshakes in handshake04.hccapx . I am using crunch with custom charset and john the ripper tool as well.Command: crunch 8 14 -f Charset\charset.lst bdo | john –stdin –session=BDO_WIFI –stdout | hashcat -m 2500 -d 1 Jobs\BDO_firemni_wifi\handshake04.hccapx
Charset: bdo = [abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%&*()-_+=[]{}\:;”‘,.?/]I am using GeForce RTX 2080 Ti: https://freeimage.host/i/2mfrkx
I installed CUDA toolkit 11.1Running crunch+john+hashcat: https://freeimage.host/i/2.2mfZEF
1) Why the status is Exhausted?
2) Why the progress is not changing?
3) When I open tak manager, I can see that processor is working o 25% and GPU is working on 0%. Why is it calculating on CPU and not GPU?Thank you!
October 15, 2020 at 6:30 pm #47133Diego PérezModeratorHi!
Did you check the link in the Device #1 warning message?Also I’ll recommend to do some basic testing, use hashcat by it’s own with a simple hash and a small wordlist, see if that works. If it doesn’t then there’s some issue with your GPU card and hashcat.
Let me know how it goes!
DiegoOctober 20, 2020 at 8:46 am #47299Marek KovalcikParticipantI did not find where the error was, but I also tried the mask attack. Estimated time is more than ten years for this optimized brutte force attack so I found it useless. Instead I am gonna find some good wordlists.
October 20, 2020 at 6:39 pm #47311Diego PérezModeratorHi!
Yeah, that can work too. Just remember you can’t try this against networks you don’t have permission to.Greetings!
Diego - AuthorPosts
- You must be logged in to reply to this topic.