On Wed 31 Jul 2019 at 16:07:33 +0300, Reco wrote: > On Wed, Jul 31, 2019 at 07:58:54AM -0400, Celejar wrote: > > mathematical analysis of how much hardware would be necessary to crack > > a good WPA2 password. I've seen lots of sites explaining how to use > > hashcat with a GPU, and various real-world tests on lists of hashed > > passwords (e.g., [1]), but can you provide a serious analysis of the > > practical cost, in time or hardware, of cracking a real-world WPA setup? > > Cost - Amazon will take 11c per hour for that VM that comes with NVIDIA > Tesla videocard. > Said hour is more than enough to bruteforce 8 character WPA passphrase > with hashcat.
In the context of a home user producing a secure wireless configuration, a 64 random character passphrase works wonders. The sky is not about to fall in. -- Brian.