just did a litttle research there. UPC WPA keys consist of 8 random capital letters.
even with this restriction, that leaves 208,827,064,576 possible combinations (26^8),
that's a wordlist of 208GB using ASCII encoding.
using aircrack-ng it would take my new system, which is checking roughly 3,000
keys a second, 2.2 years to go thru every possible combination. i think i might take
a tea break while my PC is busy.
now if someone could port aircrack to use my GT200 GPU… ;-)
-=mcmonkeys1rants.blogspot.com=-
!!! it exists!!!<br /><a href="http://www.elcomsoft.com/edpr.html" rel="nofollow">ElcomSoft Distributed Password Recovery</a><br />Has support for GPU Acceleration, and WPA1/2 cracking, amongst other password cracking support.<br /><br />Have a trial version, cracking at 10,500 keys a second. Does not seem to be using much CPU, roughly 1-core. Assume the rest is GPU.<br /><br />Trial version
UPDATE: ElcomSoft estimates 236 days to crack UPC passwords on same PC, but using GPU. My rough guestimate was 229 days. Get a fucking rack of industrial GPUs and ya might make it worth ur while -although then it's weighing up electricity bills vs broadband bills.
clearly i'm a noob. the pyrit project had got some serious game, runs using opencl, and fuck fast. they pre-compute half the handshakes -allegedly this takes 7 days on a proper pc, this computes a 600gb database for 8 character passwords. using this database and gpu+cpu compute capabilities they report cracking at 3 days!!!<br />sounds fucking awesome (a lot less than 230 days!), but requires
Hi.<br /><br />Any progress on this so far? I have been looking at how to test UPC WPA-PSK security.. and I'd like to find a way round the Blacktrack OS and Reaven.. As I'm not a Linux user.. any suggestion? Aircrack-ng?<br /><br />Thanks a lot,<br />Werot
hi<br /><br />get a linux cd and it's done in no time…. i tried the old method trial and error but it takes a lifetime … so go to youtube and start cracking
There really is no way around the "trial and error" brute force crack. You must be mistaking WEP for WPA cracking, there is a huge difference! WEP cracking is trivial and this is not the discussion. <br /><br />The quickest way to crack WPA (these days) would appear to be running pyrit on Amazon EC2 GPU. This may cost you money though.<br /><br />If you READ MY POSTS above you would see