Results 1 to 3 of 3

Thread: WPA Brute Forcing with CUDA.

  1. #1
    Just burned his ISO
    Join Date
    Nov 2010

    Default WPA Brute Forcing with CUDA.

    Hi, i was going to build a new system, with a quad core phenom II, and 2x280 GTXs in SLi. I was wondering if brute forcing 8-15 random character WPA keys is even doable, and what kind of time scale could be achieved?

    i understand 15 would really be pushing it, and i am aware of dictionary attacks, but my focus is on random characters, and would really like to know the limits and boundaries of GPU brute forcing when it comes to WPA. in terms of size, what kind of pass phrase would be a boundary size, before brute forcing becomes a lost cause?


  2. #2
    Member CKing's Avatar
    Join Date
    Mar 2010
    downtown, riverfront

    Default Re: WPA Brute Forcing with CUDA.

    The system you described would process 22,000-25,000 pmk/s. An 8 char password of lower case letters alone would take 4 monthes. For one access point. Have fun
    A true gentleman, a good hearty guy.

  3. #3
    Just burned his ISO DashingDave's Avatar
    Join Date
    Dec 2010
    UAE - Dubai

    Thumbs up Re: WPA Brute Forcing with CUDA.

    Thnax 2 Both Of U

Similar Threads

  1. SQL Server brute forcing?
    By sl33p in forum OLD Pentesting
    Replies: 4
    Last Post: 09-15-2009, 11:15 PM
  2. 25 THz pc brute forcing
    By xheia in forum OLD Newbie Area
    Replies: 1
    Last Post: 08-22-2009, 01:09 AM
  3. Time Analysis of WPA brute-forcing
    By Virchanza in forum OLD Pentesting
    Replies: 46
    Last Post: 06-24-2009, 02:33 AM
  4. Brute Forcing My Router - Issues??
    By jaycee8980 in forum OLD Newbie Area
    Replies: 2
    Last Post: 11-24-2008, 09:20 AM
  5. Is it possible? Brute forcing WEP
    By Blackrose in forum OLD Wireless
    Replies: 20
    Last Post: 09-17-2008, 07:42 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts