Re: Wireless home LAN - WiFi vs Bluetooth?
- To: debian-user@lists.debian.org
- Subject: Re: Wireless home LAN - WiFi vs Bluetooth?
- From: Celejar <celejar@gmail.com>
- Date: Wed, 31 Jul 2019 22:35:03 -0400
- Message-id: <[🔎] 20190731223503.f79770276d531c23fe5cb5ab@gmail.com>
- In-reply-to: <E1hsou0-0001Vw-3X@enotuniq.net>
- References: <3706dbf6-3b95-2458-071e-3e77581608ba@cloud85.net> <E1hs3LL-0000fA-P9@enotuniq.net> <20190730190608.1e7bace469fcf4d8ee2be47a@gmail.com> <E1hsjH3-00011O-7U@enotuniq.net> <20190731075854.8da1526625a8a003afc62414@gmail.com> <E1hsoKL-0001UP-UQ@enotuniq.net> <31072019142506.a4057076ab3c@desktop.copernicus.org.uk> <E1hsou0-0001Vw-3X@enotuniq.net>
On Wed, 31 Jul 2019 16:44:23 +0300
Reco <recoverym4n@enotuniq.net> wrote:
> On Wed, Jul 31, 2019 at 02:32:25PM +0100, Brian wrote:
> > On Wed 31 Jul 2019 at 16:07:33 +0300, Reco wrote:
> >
> > > On Wed, Jul 31, 2019 at 07:58:54AM -0400, Celejar wrote:
> > > > mathematical analysis of how much hardware would be necessary to crack
> > > > a good WPA2 password. I've seen lots of sites explaining how to use
> > > > hashcat with a GPU, and various real-world tests on lists of hashed
> > > > passwords (e.g., [1]), but can you provide a serious analysis of the
> > > > practical cost, in time or hardware, of cracking a real-world WPA setup?
> > >
> > > Cost - Amazon will take 11c per hour for that VM that comes with NVIDIA
> > > Tesla videocard.
> > > Said hour is more than enough to bruteforce 8 character WPA passphrase
> > > with hashcat.
> >
> > In the context of a home user producing a secure wireless configuration,
> > a 64 random character passphrase works wonders. The sky is not about to
> > fall in.
>
> Agreed. If 64 character password is reasonably random, bruteforcing it is
> economically unfeasible. With obvious exceptions, of course.
Explain, please? What exceptions?
Celejar
Reply to: