View Single Post
Posts: 13 | Thanked: 8 times | Joined on Oct 2010
#1061
Originally Posted by Estel View Post
Wrong. N900 is perfectly able to "crack" WPA2 password in reasonable time, if given good enough Rainbow Table for given SSID. I used term "crack" in quotes, cause via Rainbow Tables, most computing work is done *before* actual attack (without need for things like handshake - only SSID), on big machine(s), for weeks or even months. Sure, doing rest of computation on N900 (and checking all hashes) will be slower than on 2500 mHz Core2Duo, but it's nothing like lifetime or even weeks

What You're talking about, is probably bruteforcing password, which is more than lifetime (for strong passwords) even for big machines, or clouds of big machines Rainbow Tables are different thing - some kind of compromise between storage needed and computational power required. More info can be found on Wikipedia. Well, for scope of this post is enough to say, that they don't call it Rainbow Tables without purpose
You appear to be a young lad with little knowledge and big ideas that wont work. Will you care to explain to everyone how you can use Rainbow tables to crack anything with an ESSID which hasn't already been precomputed. In the real world that will be nearly all of them. In any case using Rainbow tables still requires much more resources than the N900 has. Rainbow tables are so yesterday