Open ElDavoo opened 3 months ago
Hi, First of all, thanks for your help and contribution to wpa-sec! The server combines same SSID hashes when creating the work unit, since this allows the heacy PBKDF2-SHA1 4096-round operation to be executed only once. This gives a huge speedup. If the SSID is unique, we don't have many options - we attack only one hash. Then it measures every cycle and increments the number of dictionaries it offers for cracking, up to 15 in 5-minute period. There are some things you can do on the client side, to better use the GPUs, if you have the resources:
If you have ideas and HW and want to try some more hashes, drop me a mail and we'll discuss. We have some hashes, we've battered for years and still standing :) Cheers!
First of all, thanks for your help and contribution to wpa-sec!
Thanks to you for the project, to the dedication to maintenance and for the quick and kind response!
If you have ideas and HW and want to try some more hashes, drop me a mail and we'll discuss. We have some hashes, we've battered for years and still standing :)
Sure, will do it in a few days.
I wanted to make a "Huge wordlist with a huge list of hashes" experiment, more like a one-off than a continuous run.
- there is -cd option, which is to attack all uncracked with custom dict, but it's deprecated and will be removed soon
I tried it, but only takes one unique SSID at a time, a run with wordlist takes 36 hours, so it would take 36h for each...., while giving hundreds, thousands (?) of hashes at a time should make it more efficient (should.. I mean that's the point of experimenting)
@RealEnder does wpa sec only use word list ? because if the password is not in a word list this mean we will never be able to discover password but only check for ones that have already been found
maybe having a mode where the Decrypter can do Mask Attack to find new password could be nice on old network that have never been found this may require to have some "stats" for eatch password like the number of attempt etc that have been tried on them
Hello, I've been running help_crack.py and I've noticed it's way inefficient in 2024:
I quickly scanned the server source code but I haven't found an endpoint to get all the uncracked hashes. I think doing so would speed up a lot the research, as people (like me) can try their own huge dictionaries on them. An alternative would be to get N hashes at the same time (maybe the user (the client) can choose how many, up to a max of 10? 100?), and maybe considering merging some dicts together (like the wps keys)?.
Thank you for the amazing project <3