Quantcast
Channel: hashcat Forum - All Forums
Viewing all articles
Browse latest Browse all 7673

Cracking speed

$
0
0
Hi guys,
I am trying to crack a WPA handshake via bruteforce, the password consists of eight capital letters. The command which I use in hashcat is the following:

hashcat -m 2500 -a 3 handshake.cap

Now, my question: when I tried the same via aircrack-ng and crunch, it was able to try about 1500 pw per second. Hashcat manages about 24MILLION per second
according to the status output that I get when trying to crack it. How is that possible?

Viewing all articles
Browse latest Browse all 7673

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>