#1 3. September 2011 Zuletzt von einem Moderator bearbeitet: 15. April 2017 Haben wir uns nicht lange genug mit Pyrit geschunden und das teure elcomsoft satt ? Die Lösung aller WPA Probleme ist nun in Sichtweite , je nach Hardware von euch ;-) Lange Rede kurzer Sinn... Das den meisten doch gut bekannte Programm "Hashcat" oclHashcat - advanced password recovery hat nun wpa unterstützung , aber hey , was ist nun so toll daran ???? 1.Linux/win 2.Alle aktuellen amd/nvidia laufen damit 3.Schnellstes Programm auf dem Markt (und das mit êiner Beta^^) 4.Kostenlos 5.Im gegensatz zu pyrit, aircrack-ng, cowpatty und elcomsoft wird keine cpu verbraucht waerend es laeuft 6.Der volle Hashcat-Plus crackingumfang steht euch zur verfügung, siehe oclHashcat-plus - advanced password recovery 7.Wer einmal Hashcat getestet hat will nie mehr was anderes benutzen 8.Ihr müsst eure .caps einfach auf hashcat cap2hccap - advanced password recovery umwandeln lassen und schon kann das cracken losgehen.... 9.Wer etwas Ahnung hat kann sein Aircrack auch direkt patchen Index of /cap2hccap/aircrack-ng_r1959/ ... .. . Genug der Worte , lasset uns Taten sehen..... 8 x amd 6970 @ 700.000 p/sec Code: root@erebus:~/oclHashcat-plus-0.06# ./oclHashcat-plus64.bin --hash-type 2500 --gpu-accel 80 --gpu-loops 4096 out.hccap /root/dict/wikipedia-wordlist-sraveau-20090325.txt oclHashcat-plus v0.6 by atom starting... Hashes: 1 Unique salts: 1 Unique digests: 1 Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes GPU-Loops: 4096 GPU-Accel: 80 Password lengths range: 8 - 15 Platform: AMD compatible platform found Watchdog: Temperature limit set to 90c Device #1: Cayman, 2048MB, 0Mhz, 24MCU Device #2: Cayman, 2048MB, 0Mhz, 24MCU Device #3: Cayman, 2048MB, 0Mhz, 24MCU Device #4: Cayman, 2048MB, 0Mhz, 24MCU Device #5: Cayman, 2048MB, 0Mhz, 24MCU Device #6: Cayman, 2048MB, 0Mhz, 24MCU Device #7: Cayman, 2048MB, 0Mhz, 24MCU Device #8: Cayman, 2048MB, 0Mhz, 24MCU Device #1: Allocating 144MB host-memory Device #1: Kernel ./kernels/4098/m2500.Cayman.64.kernel (1413783 bytes) Device #2: Allocating 144MB host-memory Device #2: Kernel ./kernels/4098/m2500.Cayman.64.kernel (1413783 bytes) Device #3: Allocating 144MB host-memory Device #3: Kernel ./kernels/4098/m2500.Cayman.64.kernel (1413783 bytes) Device #4: Allocating 144MB host-memory Device #4: Kernel ./kernels/4098/m2500.Cayman.64.kernel (1413783 bytes) Device #5: Allocating 144MB host-memory Device #5: Kernel ./kernels/4098/m2500.Cayman.64.kernel (1413783 bytes) Device #6: Allocating 144MB host-memory Device #6: Kernel ./kernels/4098/m2500.Cayman.64.kernel (1413783 bytes) Device #7: Allocating 144MB host-memory Device #7: Kernel ./kernels/4098/m2500.Cayman.64.kernel (1413783 bytes) Device #8: Allocating 144MB host-memory Device #8: Kernel ./kernels/4098/m2500.Cayman.64.kernel (1413783 bytes) Scanned dictionary /root/dict/wikipedia-wordlist-sraveau-20090325.txt: 743503440 bytes, 58427201 words, starting attack... linksys:dictionary Status.......: Cracked Input.Mode...: File (/root/dict/wikipedia-wordlist-sraveau-20090325.txt) Hash.Target..: linksys Hash.Type....: WPA/WPA2 Time.Running.: 10 secs Time.Util....: 10094ms/1711ms Real/CPU, 20.4% idle Speed........: 728.6k c/s Real, 742.7k c/s GPU Recovered....: 1/1 Digests, 1/1 Salts Progress.....: 9428608/58427201 (16.14%) done, 5496448/9428608 (58.30%) reject HW.Monitor.#1: 89% GPU, 46c Temp HW.Monitor.#2: 89% GPU, 52c Temp HW.Monitor.#3: 90% GPU, 49c Temp HW.Monitor.#4: 89% GPU, 49c Temp HW.Monitor.#5: 89% GPU, 48c Temp HW.Monitor.#6: 89% GPU, 48c Temp HW.Monitor.#7: 89% GPU, 47c Temp HW.Monitor.#8: 89% GPU, 44c Temp Started: Sat Sep 3 13:50:48 2011 Stopped: Sat Sep 3 13:51:08 2011 1 x 6990 umode 175.000 p/sec Code: C:\Users\john\Desktop\oclHashcat-plus-0.06b32\oclHashcat-plus-0.06>oclHashcat-p us64.exe -m 2500 alt.hccap pws.dic -n 80 --gpu-loops 4096 oclHashcat-plus v0.6 by atom starting... Hashes: 1 Unique salts: 1 Unique digests: 1 Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes GPU-Loops: 4096 GPU-Accel: 80 Password lengths range: 8 - 15 Platform: AMD compatible platform found Watchdog: Temperature limit set to 90c Device #1: Cayman, 800MB, 0Mhz, 24MCU Device #2: Cayman, 800MB, 0Mhz, 24MCU Device #1: Allocating 144MB host-memory Device #1: Kernel ./kernels/4098/m2500.Cayman.64.kernel (1413783 bytes) Device #2: Allocating 144MB host-memory Device #2: Kernel ./kernels/4098/m2500.Cayman.64.kernel (1413783 bytes) Scanned dictionary pws.dic: 134534933 bytes, 11681272 words, starting attack .. [s]tatus [p]ause [r]esume [q]uit => s Status.......: Running Input.Mode...: File (bp_pws.dic) Hash.Target..: ITSHOP Hash.Type....: WPA/WPA2 Time.Running.: 17 secs Time.Left....: 36 secs Time.Util....: 17366ms/823ms Real/CPU, 5.0% idle Speed........: 175.5k c/s Real, 183.2k c/s GPU Recovered....: 0/1 Digests, 0/1 Salts Progress.....: 5345174/11681272 (45.76%) done, 2297750/5345174 (42.99%) reject HW.Monitor.#1: 94% GPU, 70c Temp HW.Monitor.#2: 94% GPU, 69c Temp [s]tatus [p]ause [r]esume [q]uit => s Diesmal mit einer 1.2 gb WPA Dic 180.000 p/sec Code: [s]tatus [p]ause [r]esume [q]uit => s Status.......: Running Input.Mode...: File (BIG-WPA-LIST-2) Hash.Target..: ITSHOP Hash.Type....: WPA/WPA2 Time.Running.: 2 mins, 25 secs Time.Left....: 5 mins, 14 secs Time.Util....: 145299ms/3655ms Real/CPU, 2.6% idle Speed........: 180.0k c/s Real, 185.7k c/s GPU Recovered....: 0/1 Digests, 0/1 Salts Progress.....: 26148875/82522735 (31.69%) done, 11/26148875 (0.00%) reject HW.Monitor.#1: 96% GPU, 74c Temp HW.Monitor.#2: 96% GPU, 74c Temp oc 930 mhz (hier ist noch nicht schluss mit luftkühlung...) 187.000 p/sec Code: [s]tatus [p]ause [r]esume [q]uit => s Status.......: Running Input.Mode...: File (BIG-WPA-LIST-2) Hash.Target..: ITSHOP Hash.Type....: WPA/WPA2 Time.Running.: 2 mins, 0 secs Time.Left....: 5 mins, 20 secs Time.Util....: 120018ms/3232ms Real/CPU, 2.8% idle Speed........: 187.6k c/s Real, 193.3k c/s GPU Recovered....: 0/1 Digests, 0/1 Salts Progress.....: 22511627/82522735 (27.28%) done, 11/22511627 (0.00%) reject HW.Monitor.#1: 95% GPU, 74c Temp HW.Monitor.#2: 95% GPU, 75c Temp Wer es selber testen will muss sich im hashcat Forum Forum registrieren. Bitte Postet hier auch "BUGS" sowie Benchmarks in diesen Tread [oclhashcat+] wpa/wpa2 // mehr als 24h dauerlast beim cracken - nie hashcat ohne watchdog 90 or whatever laufen lassen + msi afterburner für die lüftersteuerung der karte. {img-src: //screenshots.en.softonic.com/en/scrn/92000/92169/msi-afterburner-2.jpg} + Multi-Zitat Zitieren