You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Feature Request: Prefer Hashcat over Aircrack-ng for WPA Cracking
Summary
Aircrack-ng is currently used to crack WPA handshakes in Wifite, but it's CPU-only and much slower than Hashcat, which supports GPU acceleration. This feature request proposes prioritizing Hashcat for WPA handshake cracking when available.
Motivation
Hashcat provides significantly faster WPA cracking on systems with supported GPUs. Since Hashcat supports .hccapx/.22000 format WPA handshakes, Wifite could leverage it for cracking, while still verifying cracked passwords with Aircrack-ng (which handles MIC verification).
Suggested Behavior
Use Hashcat as the primary cracking engine if installed.
Convert .cap to .hccapx using hcxpcapngtool.
Verify any cracked password using Aircrack-ng.
If verification fails, continue cracking with Hashcat from where it left off (using --restore).
Basic Outline
Detect if hashcat is installed.
Convert .cap to .hccapx or .22000 using hcxpcapngtool.
Run Hashcat with:
hashcat -m 22000 -a 0 handshake.22000 wordlist.txt --status --status-timer=2 --restore
Feature Request: Prefer Hashcat over Aircrack-ng for WPA Cracking
Summary
Aircrack-ng is currently used to crack WPA handshakes in Wifite, but it's CPU-only and much slower than Hashcat, which supports GPU acceleration. This feature request proposes prioritizing Hashcat for WPA handshake cracking when available.
Motivation
Hashcat provides significantly faster WPA cracking on systems with supported GPUs. Since Hashcat supports
.hccapx
/.22000
format WPA handshakes, Wifite could leverage it for cracking, while still verifying cracked passwords with Aircrack-ng (which handles MIC verification).Suggested Behavior
.cap
to.hccapx
usinghcxpcapngtool
.--restore
).Basic Outline
hashcat
is installed..cap
to.hccapx
or.22000
usinghcxpcapngtool
.aircrack-ng -w <(echo 'cracked_psk') -b BSSID capture.cap
--restore
auto-saves state every few seconds).Benefits
The text was updated successfully, but these errors were encountered: