Hey guys, gpuhash.me basic research has cracked this wpa2 handshake in under 15 minutes, I tried word lists and brute force but nothing. All I know is that the old password for this essid: Belbo was "987654321@" Can someone please help. Thankies
0cb6d2c995f9:3c576c7997a4:Belbo:robocop82 Please next time post your handshakes first here, before trying at GPUHASH.me...lol
Thank you sooo much Do you mind telling me how you did it, which wordlist did you use just for my future endeavors
Hi Gpuhash cracked this handshake within 15 minutes. I have tried 8 digit passwords but my cpu will take 10 hrs to complete it. Can anyone help me in cracking it?
8 numbers, no luck Session..........: rakesh Status...........: Exhausted Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL) Hash.Target......: D:\WLAN\Forum\rakesh.hc22000 Time.Started.....: Thu Jan 20 23:34:50 2022, (4 mins, 24 secs) Time.Estimated...: Thu Jan 20 23:39:14 2022, (0 secs) Kernel.Feature...: Pure Kernel Guess.Mask.......: ?d?d?d?d?d?d?d?d [8] Guess.Queue......: 1/1 (100.00%) Speed.#1.........: 378.2 kH/s (2.61ms) @ Accel:64 Loops:1024 Thr:32 Vec:1 Recovered........: 0/1 (0.00%) Digests Progress.........: 100000000/100000000 (100.00%) Rejected.........: 0/100000000 (0.00%) Restore.Point....: 10000000/10000000 (100.00%) Restore.Sub.#1...: Salt:0 Amplifier:9-10 Iteration:0-1 Candidate.Engine.: Device Generator Candidates.#1....: 62816497 -> 67646497 Hardware.Mon.#1..: Temp: 66c Util: 98% Core:1353MHz Mem:6794MHz Bus:16 Started: Thu Jan 20 23:34:47 2022 Stopped: Thu Jan 20 23:39:16 2022