<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	
	>
<channel>
	<title>
	Comments on: UPC password cracking	</title>
	<atom:link href="https://rosrants.com/upc-password-cracking/feed/" rel="self" type="application/rss+xml" />
	<link>https://rosrants.com/upc-password-cracking/</link>
	<description>I blog, therefore I am.</description>
	<lastBuildDate>Thu, 17 Apr 2014 02:04:40 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>
	<item>
		<title>
		By: mcmonkeys1		</title>
		<link>https://rosrants.com/upc-password-cracking/#comment-36</link>

		<dc:creator><![CDATA[mcmonkeys1]]></dc:creator>
		<pubDate>Sat, 08 Jun 2013 14:19:36 +0000</pubDate>
		<guid isPermaLink="false">http://rosrants.com/?p=75#comment-36</guid>

					<description><![CDATA[There really is no way around the &#038;quot;trial and error&#038;quot; brute force crack. You must be mistaking WEP for WPA cracking, there is a huge difference! WEP cracking is trivial and this is not the discussion. &#060;br /&#062;&#060;br /&#062;The quickest way to crack WPA (these days) would appear to be running pyrit on Amazon EC2 GPU. This may cost you money though.&#060;br /&#062;&#060;br /&#062;If you READ MY POSTS above you would see]]></description>
			<content:encoded><![CDATA[<p>There really is no way around the &amp;quot;trial and error&amp;quot; brute force crack. You must be mistaking WEP for WPA cracking, there is a huge difference! WEP cracking is trivial and this is not the discussion. &lt;br /&gt;&lt;br /&gt;The quickest way to crack WPA (these days) would appear to be running pyrit on Amazon EC2 GPU. This may cost you money though.&lt;br /&gt;&lt;br /&gt;If you READ MY POSTS above you would see</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Anonymous		</title>
		<link>https://rosrants.com/upc-password-cracking/#comment-35</link>

		<dc:creator><![CDATA[Anonymous]]></dc:creator>
		<pubDate>Sat, 08 Jun 2013 01:49:31 +0000</pubDate>
		<guid isPermaLink="false">http://rosrants.com/?p=75#comment-35</guid>

					<description><![CDATA[hi&#060;br /&#062;&#060;br /&#062;get a linux cd and it&#038;#39;s done in no time.... i tried the old method trial and error but it takes a lifetime ... so go to youtube and start cracking]]></description>
			<content:encoded><![CDATA[<p>hi&lt;br /&gt;&lt;br /&gt;get a linux cd and it&amp;#39;s done in no time&#8230;. i tried the old method trial and error but it takes a lifetime &#8230; so go to youtube and start cracking</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Anonymous		</title>
		<link>https://rosrants.com/upc-password-cracking/#comment-31</link>

		<dc:creator><![CDATA[Anonymous]]></dc:creator>
		<pubDate>Mon, 12 Nov 2012 17:28:33 +0000</pubDate>
		<guid isPermaLink="false">http://rosrants.com/?p=75#comment-31</guid>

					<description><![CDATA[Hi.&#060;br /&#062;&#060;br /&#062;Any progress on this so far? I have been looking at how to test UPC WPA-PSK security.. and I&#038;#39;d like to find a way round the Blacktrack OS and Reaven.. As I&#038;#39;m not a Linux user.. any suggestion? Aircrack-ng?&#060;br /&#062;&#060;br /&#062;Thanks a lot,&#060;br /&#062;Werot]]></description>
			<content:encoded><![CDATA[<p>Hi.&lt;br /&gt;&lt;br /&gt;Any progress on this so far? I have been looking at how to test UPC WPA-PSK security.. and I&amp;#39;d like to find a way round the Blacktrack OS and Reaven.. As I&amp;#39;m not a Linux user.. any suggestion? Aircrack-ng?&lt;br /&gt;&lt;br /&gt;Thanks a lot,&lt;br /&gt;Werot</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: mcmonkeys1		</title>
		<link>https://rosrants.com/upc-password-cracking/#comment-6</link>

		<dc:creator><![CDATA[mcmonkeys1]]></dc:creator>
		<pubDate>Fri, 02 Jul 2010 11:56:17 +0000</pubDate>
		<guid isPermaLink="false">http://rosrants.com/?p=75#comment-6</guid>

					<description><![CDATA[clearly i&#038;#39;m a noob. the pyrit project had got some serious game, runs using opencl, and fuck fast. they pre-compute half the handshakes -allegedly this takes 7 days on a proper pc, this computes a 600gb database for 8 character passwords. using this database and gpu+cpu compute capabilities they report cracking at 3 days!!!&#060;br /&#062;sounds fucking awesome (a lot less than 230 days!), but requires]]></description>
			<content:encoded><![CDATA[<p>clearly i&amp;#39;m a noob. the pyrit project had got some serious game, runs using opencl, and fuck fast. they pre-compute half the handshakes -allegedly this takes 7 days on a proper pc, this computes a 600gb database for 8 character passwords. using this database and gpu+cpu compute capabilities they report cracking at 3 days!!!&lt;br /&gt;sounds fucking awesome (a lot less than 230 days!), but requires</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: mcmonkeys1		</title>
		<link>https://rosrants.com/upc-password-cracking/#comment-5</link>

		<dc:creator><![CDATA[mcmonkeys1]]></dc:creator>
		<pubDate>Tue, 29 Jun 2010 03:50:37 +0000</pubDate>
		<guid isPermaLink="false">http://rosrants.com/?p=75#comment-5</guid>

					<description><![CDATA[UPDATE: ElcomSoft estimates 236 days to crack UPC passwords on same PC, but using GPU. My rough guestimate was 229 days. Get a fucking rack of industrial GPUs and ya might make it worth ur while -although then it&#038;#39;s weighing up electricity bills vs broadband bills.]]></description>
			<content:encoded><![CDATA[<p>UPDATE: ElcomSoft estimates 236 days to crack UPC passwords on same PC, but using GPU. My rough guestimate was 229 days. Get a fucking rack of industrial GPUs and ya might make it worth ur while -although then it&amp;#39;s weighing up electricity bills vs broadband bills.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: mcmonkeys1		</title>
		<link>https://rosrants.com/upc-password-cracking/#comment-4</link>

		<dc:creator><![CDATA[mcmonkeys1]]></dc:creator>
		<pubDate>Tue, 29 Jun 2010 03:21:09 +0000</pubDate>
		<guid isPermaLink="false">http://rosrants.com/?p=75#comment-4</guid>

					<description><![CDATA[!!! it exists!!!&#060;br /&#062;&#060;a href=&#034;http://www.elcomsoft.com/edpr.html&#034; rel=&#034;nofollow&#034;&#062;ElcomSoft Distributed Password Recovery&#060;/a&#062;&#060;br /&#062;Has support for GPU Acceleration, and WPA1/2 cracking, amongst other password cracking support.&#060;br /&#062;&#060;br /&#062;Have a trial version, cracking at 10,500 keys a second. Does not seem to be using much CPU, roughly 1-core. Assume the rest is GPU.&#060;br /&#062;&#060;br /&#062;Trial version]]></description>
			<content:encoded><![CDATA[<p>!!! it exists!!!&lt;br /&gt;&lt;a href=&quot;<a href="http://www.elcomsoft.com/edpr.html&#038;quot" rel="nofollow ugc">http://www.elcomsoft.com/edpr.html&#038;quot</a>; rel=&quot;nofollow&quot;&gt;ElcomSoft Distributed Password Recovery&lt;/a&gt;&lt;br /&gt;Has support for GPU Acceleration, and WPA1/2 cracking, amongst other password cracking support.&lt;br /&gt;&lt;br /&gt;Have a trial version, cracking at 10,500 keys a second. Does not seem to be using much CPU, roughly 1-core. Assume the rest is GPU.&lt;br /&gt;&lt;br /&gt;Trial version</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
