What ? On a lowly old Q6700 and stone age 2.4 Teraflop 4870x2 you ask... I'm not even reaching 40K WPA2 hashes/sec on this setup with Elcomsoft. OpenCL never made it out of beta on 4K series hardware. My machine will probably die of heat exhaustion, used a ton of electricity, and popped a mosfet around the cpu, long before I ever was ever lucky enough to find your key.
kevsamiga, thanks for your help. try this file: https://db.tt/bYl1wx5Z A new task: -------------------------------------------------- Model: unknown ISP: Moldtelecom Password format: lower case alphanumeric (but not sure) SSID: OLA_WIFI Default ssid: yes Tried: Common wordlist at gpuhash.me (after entering the code they show positive results of hacking, but i don't have bitcoins to get the password) cap file ---------------------------------------------------
I got this one, salbataciunee, here you go: 87654321 That is the password, yeah I know, I cannot believe it either, but that is it.
Demosthenes is just a WPA Magician... Are you using remote viewing techniques ? You would have still had to cover a very large key-space which takes around 80 days on a mask attack here to 8 digits. And then you would have had to know it was likely numeric to start with ! Maybe I should upgrade the GPU.
I just got lucky, I ran it through a random dictionary I have and it came up in 2min and 15 seconds. Just used that one on a whim, as I had no idea of the WPA structure.
I've always found minidwep to capture handshakes properly, but when I use handshaker by coeman75, or wifite there is always "no data" in the resulting files. I've always noticed too, that when the client connected is just a "phone" to be de-authed, then the client cannot be "booted off" to get a handshake, it has to be a real machine for a successful de-auth and capture.
I downloaded your first cap file and it is the same SSID, it had a good handshake. I ran it through a 15million word list no luck. I am now running it through 8 digit will report back when finished in about 2 hrs.
I tried this Murelly .cap in elcomsoft, but again no data in cap or I would have GPU assisted using stolen/leaked password lists as they usually give the best chances of success...
Interesting, can I get a copy of this stolen/leaked list you speak of please? I will add it to my collection. BTW, what version of Elcomsoft are you using? I have 5.0.252 professional. --- Double Post Merged, 21 Jun 2014 --- No luck here.
They can easily be found at skullsecurity... On the elcomsoft I have to use v4 something, or the R700's are not used to the full potential. AMD's drivers suck.
Your suppose to post a handshake and your router ssid make and model etc the more info the better. We cant guess your password?
th thanks for your quick response. ssid pmulia087@unfibiz model-don't know --- Double Post Merged, 22 Jun 2014 --- this is the wpa file...
can u recommend me what software i should use? where i can download the suitable dictionary for crack the password?