NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Wireless Cracking - oclhashcat brute force question


3 Results - Page 1 of 1 -
1
Author Message
Avatar
ziggycat

Status: n/a
Joined: Wed, 18 Mar 2015
Posts: 48
Team:
Reputation: 42 Reputation
Offline
Sat, 04 Apr 2015 @ 11:37:05

Hi, just cracked my first password for a virginmediaxxxxxxx handshake.

here's the command I used : oclHashcat64.bin -a 3 -m 2500 x.hccap -1 abcdefghjklmnpqrstuvwxyz ?1?1?1?1?1?1?1?1

I thought oclhc would process the keyspace sequentially ie. aaaaaaaa - azzzzzzz through to zaaaaaaa - zzzzzzzz.

the password was cracked at 92% (taking 2.5 days) yet the actual wpa key began with df------
is this normal behavior or am I missing something ?


Avatar
Hash-IT

Status: Trusted
Joined: Tue, 02 Aug 2011
Posts: 4598
Team: HashKiller
Reputation: 2982 Reputation
Offline
Sat, 04 Apr 2015 @ 13:47:48

I think you need to disable Markov to brute force sequentially.



Please read the forum rules. | Please read the paid section rules.

BTC: 1MmWESN5bKZ1YSuHrm5uNwnQYxWyQnEQ6E

Avatar
xmisery
Moderator
Status: Trusted
Joined: Fri, 06 Jun 2014
Posts: 240
Team:
Reputation: 632 Reputation
Offline
Sat, 04 Apr 2015 @ 14:04:35

@ziggycat

As Hash-IT alluded to, you need to disable Markov chains with this (--markov-disable). Otherwise, yes, what you saw is "normal behavior" as oclhc uses markov by default.


· Team Hashcat ·

$BTC | 129RuiSCtGvXsWmve1oB4DjXV7dbxSHxkd

General Forum Rules | Paid Password Recovery Rules


3 Results - Page 1 of 1 -
1

We have a total of 212138 messages in 26015 topics.
We have a total of 23009 registered users.
Our newest registered member is Francescafalk.