Or just replace output_file-01.hccapx from the section 1 with the file output_. Therefore, skip section 1 of this guide and follow the instructions in section 3.2 of the WPA2 Cracking On NVIDIA with CUDA guide. Therefore, if your Hashcat version is 6.2.4 or later, replace the 2500 plugin with 22000 in all hashcat examples.įurthermore, you need to convert the handshake in the output_file-01.7z file to the hash format supported by Hashcat 6.0.0 and later. As a result, you cannot use the hash mode 2500 or the hashes in hccapx format. If you are using Hashcat version 6.2.4 or later, please note that the plugins 2500/250/16801 are outdated and no longer functional. Important! The plugins 2500/250/16801 are supported up to Hashcat 6.2.3. The overall WPA2 cracking speed computed by hashcat installed on Windows 10 is 22 193 h/s. The ATI GPU gives us 18213 hashes per second while Intel GPU 3980. Picture 2 - Hashcat Speed Test for WPA Cracking b : run benchmark of selected hash-modes The speed test of WPA2 cracking for GPU AMD Radeon 8750M (Device 1, ) and Intel integrated GPU Intel(R) HD Graphics 4400 (Device 3) with hashcat is shown on the Picture 2. The chips on a GPU can perform specific types of operations much faster, and in a much more parallel way. However, the process of cracking passphrase can be accelerated by using GPU (graphic card).
![windows 10 automated wpa2 cracking windows 10 automated wpa2 cracking](https://2.bp.blogspot.com/-37QukwK-2OA/UEmRDqmtBlI/AAAAAAAAAD0/b-jgcJINPow/s1600/6.png)
As a possible workaround, we can use a dictionary attack hoping that the passphrase is listed in the dictionary. Obviously, my CPU Intel I7(TM)-4600U cannot perform a brute force attack against an 8-letter passphrase (minimum WPA / WPA2 passphrase length) in a feasible time. Overall_cracking time = time_for_1_letter_passphrase + time_for_2_letters_passphrase + time_for_2_letters_passphrase.
![windows 10 automated wpa2 cracking windows 10 automated wpa2 cracking](https://cdn.wccftech.com/wp-content/uploads/2020/03/7-11.png)
It consist of the sum of time intervals needed to test each passphrase length: In addition, if we do not know the exact length of the passphrase, the overall cracking time will rise. The cracking the 8 letters passphrase would take 1643 years.īrute-forcing our passphrase 'submarine' (9 lower-case letters) would take 40 years. Moreover, if the passphrase contains upper-case letters and digits as well, the S parameter is then 62 instead of 26. With the speed of 4212 keys per seconds, it would take more than one and 1/2 year to find the key. Let's say that our passphrase consists of lower-case letters (, 26 characters total) and the total passphrase length is 8 letters.
![windows 10 automated wpa2 cracking windows 10 automated wpa2 cracking](https://img.wonderhowto.com/img/08/08/63657313521575/0/hacking-windows-10-break-into-somebodys-computer-without-password-exploiting-system.w1456.jpg)
Picture 1 - Checking WPA Cracking Speed Performed by CPU
![windows 10 automated wpa2 cracking windows 10 automated wpa2 cracking](https://helpdeskgeek.com/wp-content/pictures/2020/12/2-Windows-Startup-Screen-Example-610x496.png)
Our WPA cracking speed is 4212 keys per seconds with the CPU Intel I7(TM)-4600U (Picture 1). Finally, we found the passphrase 'submarine' which is listed in a well-known dictionary - rockyyou.txt.Ĭracking the passphrase with aircarck-ng is performed entirely by CPU. As a final step, we performed dictionary attack with aircrack-ng command to find a passphrase. More specifically, we accelerated the process of generating handshake messages using aireplay-ng tool and captured the handshake using airodump-ng. In the previous tutorial, we installed the aircrack-ng suite to capture and crack the 4-way authentication handshake to obtain passphrase needed to access a wireless network. These keys are then used to encrypt data sent over wireless medium. The WPA/WPA2 4-way authentication handshake between AP (authenticator) and client (supplicant) is used to generate encryption keys.