Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Use Hashcat to calculate 140 million passwords per second and crack the WIFI password next door.

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

What is Hashcat?

What is Hashcat? Hashcat is currently the most powerful open source password recovery tool, and you can visit the Hashcat.net website to learn more about this tool. In essence, Hashcat 3.0 is an advanced password recovery tool that can use CPU or GPU resources to * more than 160 hash types of passwords

Back to the top.

Computer environment preparation

The local test system is Mac

The 4-way handshake file captured by airodump needs to be converted to hccap format.

Dictionary file in txt format

Back to the top.

Comparison between Hashcat and aircrack-ng

It takes 50 hours to crack an 8-digit password using aricrack-ng brute force, but less than an hour and a half to use Hashcat.

When using aircrac-ng to crack the password, the computer will burst the card. It is common to take up 100% of the memory. When using Hashcat to crack, the computer is not stuck at all. Hashcat not only supports CPU cracking, but also supports GPU cracking. It uses the computing power of the graphics card to crack very fast.

Even if you use ordinary CPU or GPU, you can generate 135 million hashes per second. My computer is Mac Air. Cracking 8 digits requires a random combination of 68719476736 digits. This is a number of ten million. Using Hashcat to crack only takes 1 hour and 40 minutes, with an average of 1.4 billion passwords per second.

Back to the top.

Installation of Hashcat

First, down the source code above github to local:

Run the following code

Git clone https://github.com/hashcat/hashcat.git

Then build the project:

Run the following code

Cd hashcat / / enter the directory sudo make sudo make install / / install hashcat

If the installation is successful, type hashcat on the command line and you will see the help documentation:

Run the following code

View Code

Back to the top.

Use Hashcat to crack WPA/PSK password

First of all, the cap file captured by airodump should be converted into hccap format, which can be converted online, the address that can be converted online is https://hashcat.net/cap2hccap/, or it can be converted by aircrack-ng.

Run the following code

Aircrack-ng-J

Using the hashcat command, the first parameter:-m 2500 is the cracking mode in WPA/PSK mode, the second parameter: the file in hccap format is the newly converted file, and the third parameter: dics.txt is the dictionary file:

Run the following code

Hashcat-m 2500 out.hccap.hccap dics.txt

The progress of cracking can be seen by pressing the s key on the keyboard:

Finally, good luck, 6666 new channel IELTS.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report