Tagged: 

  • This topic has 3 replies, 2 voices, and was last updated 1 year ago by diegodiego.
Viewing 4 posts - 1 through 4 (of 4 total)
  • Author
    Posts
  • #47006
    AvatarMarek Kovalcik
    Participant

    Hello,
    I have a problem with cracking WPA2 password with HashCat. I have captured handshakes in handshake04.hccapx . I am using crunch with custom charset and john the ripper tool as well.

    Command: crunch 8 14 -f Charset\charset.lst bdo | john –stdin –session=BDO_WIFI –stdout | hashcat -m 2500 -d 1 Jobs\BDO_firemni_wifi\handshake04.hccapx
    Charset: bdo = [[email protected]#$%&*()-_+=[]{}\:;”‘,.?/]

    I am using GeForce RTX 2080 Ti: https://freeimage.host/i/2mfrkx
    I installed CUDA toolkit 11.1

    Running crunch+john+hashcat: https://freeimage.host/i/2.2mfZEF

    1) Why the status is Exhausted?
    2) Why the progress is not changing?
    3) When I open tak manager, I can see that processor is working o 25% and GPU is working on 0%. Why is it calculating on CPU and not GPU?

    Thank you!

    #47133
    diegodiego
    Moderator

    Hi!
    Did you check the link in the Device #1 warning message?

    Also I’ll recommend to do some basic testing, use hashcat by it’s own with a simple hash and a small wordlist, see if that works. If it doesn’t then there’s some issue with your GPU card and hashcat.

    Let me know how it goes!
    Diego

    #47299
    AvatarMarek Kovalcik
    Participant

    I did not find where the error was, but I also tried the mask attack. Estimated time is more than ten years for this optimized brutte force attack so I found it useless. Instead I am gonna find some good wordlists.

    #47311
    diegodiego
    Moderator

    Hi!
    Yeah, that can work too. Just remember you can’t try this against networks you don’t have permission to.

    Greetings!
    Diego

Viewing 4 posts - 1 through 4 (of 4 total)
  • You must be logged in to reply to this topic.