

Picture 2 - Hashcat Speed Test for WPA Cracking b : run benchmark of selected hash-modes The speed test of WPA2 cracking for GPU AMD Radeon 8750M (Device 1, ) and Intel integrated GPU Intel(R) HD Graphics 4400 (Device 3) with hashcat is shown on the Picture 2. The chips on a GPU can perform specific types of operations much faster, and in a much more parallel way. However, the process of cracking passphrase can be accelerated by using GPU (graphic card). As a possible workaround, we can use a dictionary attack hoping that the passphrase is listed in the dictionary. Obviously, my CPU Intel I7(TM)-4600U cannot perform a brute force attack against an 8-letter passphrase (minimum WPA / WPA2 passphrase length) in a feasible time. Overall_cracking time = time_for_1_letter_passphrase + time_for_2_letters_passphrase + time_for_2_letters_passphrase. It consist of the sum of time intervals needed to test each passphrase length:

In addition, if we do not know the exact length of the passphrase, the overall cracking time will rise. The cracking the 8 letters passphrase would take 1643 years.īrute-forcing our passphrase 'submarine' (9 lower-case letters) would take 40 years. Moreover, if the passphrase contains upper-case letters and digits as well, the S parameter is then 62 instead of 26. With the speed of 4212 keys per seconds, it would take more than one and 1/2 year to find the key. Let's say that our passphrase consists of lower-case letters (, 26 characters total) and the total passphrase length is 8 letters. Picture 1 - Checking WPA Cracking Speed Performed by CPU Our WPA cracking speed is 4212 keys per seconds with the CPU Intel I7(TM)-4600U (Picture 1). Finally, we found the passphrase 'submarine' which is listed in a well-known dictionary - rockyyou.txt.Ĭracking the passphrase with aircarck-ng is performed entirely by CPU. As a final step, we performed dictionary attack with aircrack-ng command to find a passphrase. More specifically, we accelerated the process of generating handshake messages using aireplay-ng tool and captured the handshake using airodump-ng.
HOW TO FIND WPA2 HASH CRACK
In the previous tutorial, we installed the aircrack-ng suite to capture and crack the 4-way authentication handshake to obtain passphrase needed to access a wireless network. These keys are then used to encrypt data sent over wireless medium. The WPA/WPA2 4-way authentication handshake between AP (authenticator) and client (supplicant) is used to generate encryption keys.
