Update Pentesting tools News 05-Sep-2011
oclHashcat-plus adds support to WPA/WPA2 GPU-cracking using Aircrack-ng!
OclHashcat-plus is the GPU accelerated version of Hashcat password cracker.
OclHashcat-plus v0.06
is able to use up to 16 GPUs and is available in two versions: OpenCL (oclHashcat)
and CUDA (cudaHashcat)
and now also implement the WPA/WPA2 cracking using Aircrack-ng capture file.
This new version was faster than every other WPA cracker
in every configuration tested.
Especially owners of AMD cards and owners of multi GPU systems will see a neat improvement.
Here are the main features of OclHashcat-plus v0.06:
-
Multi-GPU
(up to 16 gpus)
-
Worlds fastest md5crypt, phpass, mscash2 and WPA/WPA2 cracker
-
Multi-Hash (up to 24 million hashes)
-
Multi-OS (Linux and Windows native binaries)
-
Multi-Platform (OpenCL and CUDA support)
-
Multi-Algo (MD4, MD5, SHA1, DCC, NTLM, MySQL, WPA/WPA2, etc.. etc..) Algorithms List
-
Fastest multihash MD5 cracker on NVidia cards
-
Fastest multihash MD5 cracker on ATI 5xxx cards
-
Supports wordlists
with single dictionary based attacks (not limited to Brute-Force attack)
-
Supports pause/resume while cracking
-
Supports reading words from file
-
Supports reading words from stdin
-
Integrated thermal watchdog
-
Plus 20 Algorithms implemented
-
Combines Dictionary-Attack with Mask-Attack to launch a Hybrid-Attack
-
Runs very cautious, you can still watch movies or play games while cracking
-
The first and only GPU-based Fingerprint-Attack engine
-
Includes hashcats entire rule engine to modify wordlists on start
-
And much more . . . .
Download oclHashcat-plus v0.06 from official Website Download oclhashcat-plus
Online cap2hccap file converter
To convert the WPA/WPA2 pcap capture file to Hashcat format refer to: Cap2hccap converter.
Aircrack-ng + oclHashcat-plus patch
Or apply this patch to Aircrack-ng 1.1
revision 1959 to export .cap file which is required for cracking WPA/WPA2 in oclHashcat-plus: OclHashcat-plus WPA/WPA2 Support Patch.
Code:
cd ~/
svn co -r 1959 http://trac.aircrack-ng.org/svn/trunk aircrack-ng
cd ~/aircrack-ng
wget http://trac.aircrack-ng.org/raw-attachment/ticket/937/oclHashcat-plus-wpa-support.patch
cat oclHashcat-plus-wpa-support.patch | patch -Np0
make sqlite=true unstable=true
sudo make sqlite=true unstable=true install
After applyng the patch use the new
-J
option to create the compatible Hashcat capture file.
jano:~$ aircrack-ng
Aircrack-ng 1.1 r1959 - (C) 2006-2010 Thomas d'Otreppe
Original work: Christophe Devine
http://www.aircrack-ng.org
usage: aircrack-ng [options] <.cap / .ivs file(s)>
WPA-PSK options:
-E <.file> : create EWSA Project file v3
-J <.file> : create Hashcat Capture file
-S : WPA cracking speed test
-r <.DB> : path to airolib-ng databasef
(Cannot be used with -w)
Update Pentesting tools News 09-Sep-2011
Aircrack-ng adding patch to export file for WPA/WPA2 using oclHashcat-plus
Aicrack-ng added support to export the handshake captured by Airodump-ng in .hccap file format, compatible with OclHashcat-plus, so for the correct installation see this page:
How to installing Aircrack-ng.
After the installation/update of SVN version of Aircrack-ng and captured the WPA handshake using Airodump-ng, follow these steps:
aircrack-ng -J Test-OCL Your_Captured_File.cap
Then attack with oclHashcat-plus.
Enjoy, Jano