View Single Post
Posts: 13 | Thanked: 8 times | Joined on Oct 2010
#1063
Estel, What i don't like about your posts is the fact that you clearly don't know what you are talking about and others may be misled by your nonsense. Its your fault for uttering them and the fact that I have picked you up over it.

I know how to crack WPA and have done it, I can assure you that the nonsense of any belief that the N900 can do in a real world situation is beyond any credibility.
WPA can be cracked but not on a N900 that was always the case and that will always be the case no matter what imaginations your mind might invent. The only known real world way to crack WPA is with a brute force dictionary attack. This means you need a large dictionary in the hope that in it somewhere will the be the passwd you are trying to find, if it isn't you are doomed to failure. Together with this you need a computer with a decent GPU, mine has 2 GPU's and you probably would be best to use Pyrit.

This quote is from the pyrit Web-page :-

Attacking WPA/WPA2 by brute-force boils down to to computing Pairwise Master Keys as fast as possible. Every Pairwise Master Key is 'worth' exactly one megabyte of data getting pushed through PBKDF2-HMAC-SHA1. In turn, computing 10.000 PMKs per second is equivalent to hashing 9,8 gigabyte of data with SHA1 in one second. The following graph shows various performance numbers measured on platforms supported by Pyrit.

In short Estel your ideas and comments about the ability of the N900 being able to crack WPA is Pure Bollocks

My computer does 180000 PMK's per second and takes about an hour to process the ESSID to compute all the Pairwise Master Keys, it also makes a very efficient room heater in the process because the 1 kilowatt computer power supply is being heavily used.After I still have to process all the Pairwise Master Keys against the dictionary.

Last edited by Trine; 2011-08-12 at 19:19.