Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How long does the cracking process take? I remember WEP only taking 10 minutes using aircrack-ng in BackTrace... I imagine this takes substantially longer.


It's not viable for those random 12-ish digit passwords most ISPs will use.


Yeah, which is why it is sometimes weirdly safer to not change your SSID - a cracker can assume that someone who figured out how to change the broadcast name could've also changed the WiFi password... often to something much less secure.


SSID is used for password hashing, so better change it from default to avoid rainbow tables.


So I don't have experience with WPA cracking, but if the access point has WPS (the click to connect button) you can sniff handshakes on the network and crack the WPA password it in relatively no time. In my experience this has usually been under 10 minutes.


On most recent firmware, there is an exponential backoff on WPS connection attempts.


>Naive-hashcat uses various dictionary, rule, combination, and mask attacks and it can take days or even months to run against strong passwords. The cracked password will be saved to hackme.pot, so check this file periodically.


Time taken to crack WEP depended on if it was a 64 or 128 bit key

I did a study using an Atom netbook - a 64 bit key (10 digits long) took 8 mins to find, 128 (26 digits) took 30 mins


If it is as slow as SHA512 then it will take 20 days on AWS g2 x8 large for 8 characters (made of alphanumeric or some 10 other symbols).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: