On Wed, Jul 31, 2019 at 02:32:25PM +0100, Brian wrote:
On Wed 31 Jul 2019 at 16:07:33 +0300, Reco wrote:
On Wed, Jul 31, 2019 at 07:58:54AM -0400, Celejar wrote:
mathematical analysis of how much hardware would be necessary to crack
a good WPA2 password. I've seen lots of sites explaining how to use
hashcat with a GPU, and various real-world tests on lists of hashed
passwords (e.g., [1]), but can you provide a serious analysis of the
practical cost, in time or hardware, of cracking a real-world WPA setup?
Cost - Amazon will take 11c per hour for that VM that comes with NVIDIA
Tesla videocard.
Said hour is more than enough to bruteforce 8 character WPA passphrase
with hashcat.
In the context of a home user producing a secure wireless configuration,
a 64 random character passphrase works wonders. The sky is not about to
fall in.
Agreed. If 64 character password is reasonably random, bruteforcing it is
economically unfeasible. With obvious exceptions, of course.
Entering such password to a device is somewhat tedious though.