I’m trying aircrack-ng attack like below:
crunch 1 2 -f /usr/local/Cellar/crunch/3.6/share/charset.lst mixalpha-numeric|aircrack-ng -b 90:F6:52:80:B9:E2 -w - ~/DumpLog*
⋮
Crunch will now generate the following number of lines: 221918520426688
⋮
and it can’t finish. I see that it should go through Petabytes in relatively small amount of time (here’s example of 10 letter pwd cracked in 30mins: Cracking WPA key with crunch | aircrack)
I’ve tried simply
crunch 1 2 -f /usr/local/Cellar/crunch/3.6/share/charset.lst mixalpha-numeric|aircrack-ng -b 90:F6:52:80:B9:E2 -w - ~/DumpLog*
Crunch will now generate the following amount of data: 11656 bytes
0 MB
0 GB
0 TB
0 PB
Crunch will now generate the following number of lines: 3906
Opening /Users/msciwoj/DumpLog 16-04-19 00:02
Opening /Users/msciwoj/DumpLog 16-04-19 22:48.1
Opening /Users/msciwoj/DumpLog 16-04-20 16:06
Reading packets, please wait...
Aircrack-ng 1.1
Passphrase not in dictionary
and it’s taking ~30seconds (for only 4k combinations!)
- What am I doing wrong? Is there better/faster method (than crunch) to
generate all possible permutations?
- Is there anything wrong with the capture files I have:
.
ls -l ~/DumpLog*
-rw-r--r-- 1 msciwoj 388572231 Apr 19 16:29 /Users/msciwoj/DumpLog 16-04-19 00:02
-rw-r--r-- 1 msciwoj 856313817 Apr 20 08:41 /Users/msciwoj/DumpLog 16-04-19 22:48.1
-rw-r--r-- 1 msciwoj 426269497 Apr 20 22:10 /Users/msciwoj/DumpLog 16-04-20 16:06
- could the fact I’m on Mac OS X have to do anything with it?
Continue reading aircrack-ng fed with crunch taking ages→