NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - WPA Packet Cracking - VM Help or support.


6 Results - Page 1 of 1 -
1
Author Message
Avatar
bithellbox

Status: n/a
Joined: Wed, 04 Jan 2017
Posts: 102
Team:
Reputation: 0 Reputation
Online
Wed, 11 Dec 2019 @ 00:25:08

I'm not asking anyone to run this for me, although if you think you can, feel free. Task impossible almost
I'm just looking for the best hashcat command to use for this.
Any help is massively appreciated as always and +rep will be given for any input.

It's VMXXXXXX - 0-9a-zA-Z Len:12


Attachments: Login to view attachments.
Avatar
xut

Status: n/a
Joined: Sat, 18 May 2019
Posts: 468
Team:
Reputation: 286 Reputation
Offline
Wed, 11 Dec 2019 @ 04:29:06

bithellbox said:

I'm not asking anyone to run this for me, although if you think you can, feel free. Task impossible almost
I'm just looking for the best hashcat command to use for this.
Any help is massively appreciated as always and +rep will be given for any input.

It's VMXXXXXX - 0-9a-zA-Z Len:12


Attachments: Login to view attachments.
Avatar
bithellbox

Status: n/a
Joined: Wed, 04 Jan 2017
Posts: 102
Team:
Reputation: 0 Reputation
Online
Wed, 11 Dec 2019 @ 04:43:48

xut said:

bithellbox said:

I'm not asking anyone to run this for me, although if you think you can, feel free. Task impossible almost
I'm just looking for the best hashcat command to use for this.
Any help is massively appreciated as always and +rep will be given for any input.

It's VMXXXXXX - 0-9a-zA-Z Len:12

Thanks for converting. What rules should I run with hashcat? +rep given


Avatar
Jaeger

Status: n/a
Joined: Tue, 05 Nov 2019
Posts: 14
Team:
Reputation: 6 Reputation
Offline
Wed, 11 Dec 2019 @ 05:28:25

I don't know if there is a "best command" for these specific tasks. The number of possibilities is immensely large: 26 lowercase letters, 26 uppercase letters and 10 digits = 62 possible characters. If we add to this that the key is of length 12, then we have 62^12, which is equivalent to 3,226,266,762,397,899,821,056 combinations (I don't even know how to read this number).

If we assume that we have available a rig of 12xGTX 1080ti (which is already very unlikely), we would have a computing power of 6,912,000 h/s approx. If the appropriate division is made, it is obtained as a result that the estimated time to cover all the possibilities is 466,763,131,133,955 seconds, which transformed to another unit of time is approximately 14,800,962 years. I hope you see that this type of attack is unfeasible.

If you still want to continue with this titanic task, I would recommend using the following syntax:

hashcat64 -O -D 1,2 -w 4 -1 ?l?u?d --force -a 3 -m 2500 (name of the hccapx file) ?1?1?1?1?1?1?1?1?1?1?1?1

-O = load the optimized kernel (if possible). It can be used when the password does not exceed length 32
-D 1,2 = Indicates that both CPU and GPU should be used
-w 4 = Set the workload that Hashcat will use. In level 4 you will use all possible resources, maximizing the speed of cracking, but generating more lag and heat.
-1 = Indicates that a custom mask will be used, which consists of uppercase letters (?u), lowercase letters (?l) and numbers (?d)
--force = It forces the devices that are normally omitted to be used (mandatory to use if using any Intel GPU).
-a 3 = use Brute-Force attack mode

Find another way to carry out this work, brute force you will not succeed.
Have luck in this job.


Avatar
xut

Status: n/a
Joined: Sat, 18 May 2019
Posts: 468
Team:
Reputation: 286 Reputation
Offline
Wed, 11 Dec 2019 @ 05:55:10

Jaeger said:

I don't know if there is a "best command" for these specific tasks. The number of possibilities is immensely large: 26 lowercase letters, 26 uppercase letters and 10 digits = 62 possible characters. If we add to this that the key is of length 12, then we have 62^12, which is equivalent to 3,226,266,762,397,899,821,056 combinations (I don't even know how to read this number).

If we assume that we have available a rig of 12xGTX 1080ti (which is already very unlikely), we would have a computing power of 6,912,000 h/s approx. If the appropriate division is made, it is obtained as a result that the estimated time to cover all the possibilities is 466,763,131,133,955 seconds, which transformed to another unit of time is approximately 14,800,962 years. I hope you see that this type of attack is unfeasible.

If you still want to continue with this titanic task, I would recommend using the following syntax:

hashcat64 -O -D 1,2 -w 4 -1 ?l?u?d --force -a 3 -m 2500 (name of the hccapx file) ?1?1?1?1?1?1?1?1?1?1?1?1

-O = load the optimized kernel (if possible). It can be used when the password does not exceed length 32
-D 1,2 = Indicates that both CPU and GPU should be used
-w 4 = Set the workload that Hashcat will use. In level 4 you will use all possible resources, maximizing the speed of cracking, but generating more lag and heat.
-1 = Indicates that a custom mask will be used, which consists of uppercase letters (?u), lowercase letters (?l) and numbers (?d)
--force = It forces the devices that are normally omitted to be used (mandatory to use if using any Intel GPU).
-a 3 = use Brute-Force attack mode

Find another way to carry out this work, brute force you will not succeed.
Have luck in this job.

you could be shit outta luck,

VMXXXXXXX [0-9a-zA-Z]

is just too difficult, unless you collect enough default router passwords (i.e from labels) and notice a pattern.


Avatar
bithellbox

Status: n/a
Joined: Wed, 04 Jan 2017
Posts: 102
Team:
Reputation: 0 Reputation
Online
Wed, 11 Dec 2019 @ 13:35:27

Thank you both for your input. +rep



6 Results - Page 1 of 1 -
1

We have a total of 220351 messages in 26892 topics.
We have a total of 23606 registered users.
Our newest registered member is Jwd.