Description: Testing the GPU using Pyrit + Cuda-Multiforcer
Tags: gpu , pyrit , cuda , wpa , capture , crack , multiforcer ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Quick question concerning Pyrit. Besides performing dictionary attacks, can it also do brute forcing against WPA hashes at all? I am going to be building a system with x2 of the new Nvidia GTX 590 cards.
Thank you
Infiltrator
Take a look here http://sprunge.us/IEUM
crunch will do an stdout, so you can pipe results into pyrit
./crunch 8 8 0123456789 | pyrit -r wpa.cap -e "AP Name" -i - attack_passthrough
This would generate every numeric combination using numbers 0-9 with a length of 8
You should also take a look at this discussion
http://tinyurl.com/3vpf2bb