[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Wireless home LAN - WiFi vs Bluetooth?



On Wed, Jul 31, 2019 at 10:35:03PM -0400, Celejar wrote:
> On Wed, 31 Jul 2019 16:44:23 +0300
> Reco <recoverym4n@enotuniq.net> wrote:
> 
> > On Wed, Jul 31, 2019 at 02:32:25PM +0100, Brian wrote:
> > > On Wed 31 Jul 2019 at 16:07:33 +0300, Reco wrote:
> > > 
> > > > On Wed, Jul 31, 2019 at 07:58:54AM -0400, Celejar wrote:
> > > > > mathematical analysis of how much hardware would be necessary to crack
> > > > > a good WPA2 password. I've seen lots of sites explaining how to use
> > > > > hashcat with a GPU, and various real-world tests on lists of hashed
> > > > > passwords (e.g., [1]), but can you provide a serious analysis of the
> > > > > practical cost, in time or hardware, of cracking a real-world WPA setup?
> > > > 
> > > > Cost - Amazon will take 11c per hour for that VM that comes with NVIDIA
> > > > Tesla videocard.
> > > > Said hour is more than enough to bruteforce 8 character WPA passphrase
> > > > with hashcat.
> > > 
> > > In the context of a home user producing a secure wireless configuration,
> > > a 64 random character passphrase works wonders. The sky is not about to
> > > fall in.
> > 
> > Agreed. If 64 character password is reasonably random, bruteforcing it is
> > economically unfeasible. With obvious exceptions, of course.
> 
> Explain, please? What exceptions?

Oh, you know. That three-letter government agencies, Russian and
Chineese state-sponsored hackers, all that scary stories of 21st
century.

Also, never underestimate the computing power of well-built botnet. If
you have an access to hundreds of thousands videocards - many things are
possible.

Reco


Reply to: