Results 1 to 8 of 8

Thread: Aircrack (+) airolib speed

  1. #1
    Join Date
    2016-May
    Posts
    1

    Aircrack (+) airolib speed

    Hello guys,
    I have a question. I read on the web that airolib is usefull to speed aircrack pass search and tried it. The problem is that when I'm creating a db from a 25 millions lines file, the --batch takes a lot of hours at 200pmk/s. Instead of lonely aircrack that goes at 1000psw/s. So, where is the speed up?
    Thanks

  2. #2
    Join Date
    2013-Jul
    Posts
    820
    In brute forcing a WPA key aircrack-ng goes thru several processes or steps and each step requires time. If you can remove one of these steps there are fewer steps thus speed is increased.

    In one of these steps the ESSID or Network name is used to produce a PMK.
    As the ESSID name is known. you could precompute this variable.

    Normally PMKs are precomputed for Networks whos names do not change and/or precomputed for Common names used for the ESSID.

    PMKS only work for that specific Network Name or ESSID. Any changes even in case invalidate the PMK

    For example a PMK computed against "Default" would not work for "default"

    Precomputed PMKs are called rainbow tables and can be found for download at internet sites. A list of ESSIDs these rainbow tables are computed against come as a small text file along with the download.

    If you are trying to brute force a WPA key and have not already precomputed PMKs against that ESSID, precomputing pmks are a waste of time unless you think in the future the Network might change its WPA key but not its name.

    Cracking WPA is really still a matter of social engineering versus equipment.

    For equipment you whould use 64 bit windows seven or higher and install two high-end video cards. Use elcomsoft wireless auditor and get video cards supported by this program.

    Run numeric strings 8 thru 10 and precompute these files with crunch as text breaking the files down into 200,000 sizes.

    Try and avoid passthrus like crunch - aircrack-ng when possible(in elcomsoft it is called a mask attack), as the computer speed slows if the computer must first precompute the password and then check it for validity as the password. Ony use a passthru when the wordlist file is so large as to be impracticable.

    There are several good WPA dictionaries available for download. Seach the net. Many of these large dictionaries are available thru torrents. We like the dictionaries produced by g0tmi1k.

    Run common passwords and dictionaries made from essidprobes first. See WPA keys in clear text, next run numeric strings 8 to 10 in length and only then turn to large WPA password files.

    Musket Teams
    Last edited by mmusket33; 2016-05-11 at 12:10.

  3. #3
    Join Date
    2018-Feb
    Location
    USA
    Posts
    5
    Excellent explanation! Thank you so much for the detailed outline of the information. Very easy to understand without a head ache. My apologies I am just excited because I have successfully tested reaver, wash, and getting a handshake is simple. I’ve just never had the patients to use aircrack-ng with wpa/wpa2 or someone to explain the process of what I was reading, to help me better understand why I have to wait for brute force so long. I know your post is from like ages ago. However if correct me if I am wrong. But as far as precomputed pmks, when u go to batch the file, the amount of time for the batch to finish is based off of keys generated from the wordlist and ESSID files, so it obviously will be a lot faster than just a straight brute force with jtr or with crunch. Is this correct how I am seeing this is speeding things up ?!

  4. #4
    Join Date
    2018-Feb
    Location
    USA
    Posts
    5
    I have 57,813,822 combinations of password that need to be computed based off the wordlist I used. I have so far computed 1,250,000 pmks in roughly under 2921 secs, so I could more than likely go to bed now and wake up and this would be done. Maybe get a couple rounds in on Destiny2, but definitely a lot faster!

  5. #5
    Join Date
    2018-Jan
    Posts
    5

    Aircrack airolib speed

    Does anyone know the address to a stock pr3 or pw0 to remove the speed limiter. If so, what values do i put in to get rid of it. If there was one thing I could do, it would be to remove the speed limiter off my stock chip rom image and burn it to another chip

    G

  6. #6
    Join Date
    2016-Dec
    Location
    Canada
    Posts
    196
    Quote Originally Posted by Ray636 View Post
    Excellent explanation! Thank you so much for the detailed outline of the information. Very easy to understand without a head ache. My apologies I am just excited because I have successfully tested reaver, wash, and getting a handshake is simple. I’ve just never had the patients to use aircrack-ng with wpa/wpa2 or someone to explain the process of what I was reading, to help me better understand why I have to wait for brute force so long. I know your post is from like ages ago. However if correct me if I am wrong. But as far as precomputed pmks, when u go to batch the file, the amount of time for the batch to finish is based off of keys generated from the wordlist and ESSID files, so it obviously will be a lot faster than just a straight brute force with jtr or with crunch. Is this correct how I am seeing this is speeding things up ?!
    From what i understand airolib is similar to cowpatty ( im messing around with both) as they both precompute the psk. If so the first precompute is all you need or should take the longest. After that cowpatty would take up to 10 seconds to lokate the password. To precompute the psk you can add a new bssid to the data base. Or delete a old ones, keeping the already computed data. Providing the password was in the database.
    PSK preshared key. Provided in a fourwayhand shake known by both AP and device.
    Last edited by bigbiz; 2018-02-05 at 02:08.

  7. #7
    Join Date
    2018-Feb
    Location
    USA
    Posts
    5
    This makes sense, thank you so much!

  8. #8
    Join Date
    2018-Feb
    Location
    USA
    Posts
    5
    When you say pr3 and pw0 are you speaking of cpu or gpu? because the speed will depend on the hardware and availability of the drivers for that hardware. you could try searching for "overclocking 'version of your cpu or gpu' " in google instead of speed limited unlock. Good question tho good sir, made me think a bit!

    @BookerScacy
    Last edited by Ray636; 2018-02-10 at 18:26.

Similar Threads

  1. Replies: 61
    Last Post: 2016-03-26, 09:07
  2. Aircrack Speed
    By Name Taken in forum NetHunter General Questions
    Replies: 0
    Last Post: 2016-01-23, 04:35
  3. airolib-ng -r
    By sircolin in forum General Archive
    Replies: 0
    Last Post: 2015-10-02, 19:11

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •