NETGEARXX wordlist 1.08

Extremely effective WPA default wordlist

  1. blu3ski3s

    blu3ski3s Active Member

    Joined:
    8 Sep 2015
    Messages:
    4
    Likes Received:
    2
    Works for me, but i reuploaded to another site for you.
    http://s000.tinyupload.com/?file_id=42044400085988729643 - Netgear Wordlist - v1.05
    http://s000.tinyupload.com/?file_id=00375140742816798553 - Mycharterwifi Wordlist - v1.05

    Hope that helps.
    --- Double Post Merged, 8 Nov 2015, Original Post Date: 8 Nov 2015 ---
    I would expect most updates from now on will be only a few words at most to adjective/noun, maybe just have a README file that can be downloaded or just as a post, that way we can quickly add to our existing lists for quicker cracking times of old captures and there is no need for downloading 9mb (340mb uncompressed) files every update.

    I personally never use adjective_noun_1d, adjective_noun_3d, adjective_noun, i combine at cracking time. Therefore i would personally greatly benefit from listing the updates rather then redownloading the entire list every update. (i'd assume others will too)

    Version 1.05:
    The following adjectives and nouns where added to the lists in this version, and applied to adjective_noun_1d, adjective_noun_3d, adjective_noun:

    adjective:
    ------------
    ancient
    antique

    nouns:
    ---------
    airplane
    apple

    Thanks again for all your work gearjunkie :)
     
    • Agree Agree x 1
    • Winner Winner x 1
  2. Garry Andrew

    Garry Andrew Well-Known Member

    Joined:
    31 Jul 2012
    Messages:
    34
    Likes Received:
    28
    Dear blu3ski3s, Thankyou for taking the trouble+++ and effort to put another link in. I am grateful to you too gearjunkie and you blu3ski3s, for all the effort+++++.

    Link did not like unauthenticated https:, but I changed location and got it on the third location go. What a variety of responses between Windows 7, XP, Internet Explorer, Safari, Google Chrome and Firefox. (Laughing bigtime now but at my own trouble, not at the gracious effort by you both.

    Can confirm in all the different versions including previous V1.04, I have never had a knockback from NetgearXXX, SSID, using this list. Total number of tests around 15-20 with full completion. Only time there is difficulty is when its out of range and cant capture the return. Otherwise fully positive feedback for the list.

    Thankyou again,

    Garry :happy:
     
    • Like Like x 1
  3. gearjunkie

    gearjunkie Well-Known Member
    VIP

    Joined:
    28 Aug 2014
    Messages:
    454
    Likes Received:
    481
    Looks like what you are interested in is a changelog. I will find some way to add it in. In the meantime, the last 2 words (adjectives) added were manic and gifted.
     
    • Like Like x 1
  4. nayc

    nayc New Member

    Joined:
    12 Jun 2015
    Messages:
    1
    Likes Received:
    1
    Hey guys, know this thread is rather old. Curious if anyone would still like to run a few that didn't return any hits in the 1.05 lists for me. :)
     

    Attached Files:

    • Like Like x 1
  5. jabali

    jabali Member

    Joined:
    23 Nov 2015
    Messages:
    5
    Likes Received:
    5
    luck with this default password, I hope they can.
     

    Attached Files:

    • Like Like x 1
  6. gearjunkie

    gearjunkie Well-Known Member
    VIP

    Joined:
    28 Aug 2014
    Messages:
    454
    Likes Received:
    481
    This is a long thread but we are still accepting new handshakes to discover new words. Both the handshakes you uploaded are bad so please do a re-capture.

    Code:
    Select All
    # pyrit -r NETGEAR64.cap analyze Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com This code is distributed under the GNU General Public License v3+ Parsing file 'NETGEAR64.cap' (1/1)... Parsed 3 packets (3 802.11-packets), got 1 AP(s) #1: AccessPoint 6c:b0:ce:ff:3e:68 ('NETGEAR64'): #1: Station 60:02:b4:44:7b:d6, 1 handshake(s): #1: HMAC_SHA1_AES, bad, spread 1 # pyrit -r NETGEAR92.cap analyze Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com This code is distributed under the GNU General Public License v3+ Parsing file 'NETGEAR92.cap' (1/1)... Parsed 35 packets (35 802.11-packets), got 1 AP(s) #1: AccessPoint a0:63:91:1e:a4:3a ('NETGEAR92'): #1: Station 00:c0:ca:5a:35:de #2: Station 48:50:73:bb:cc:c8 #3: Station 40:e2:30:7d:23:91 No valid EAOPL-handshake + ESSID detected.
    --- Double Post Merged, 28 Nov 2015, Original Post Date: 28 Nov 2015 ---
    Your handshake is bad too so please re-capture.
     
    • Like Like x 1
  7. Mr Wolf

    Mr Wolf Well-Known Member

    Joined:
    1 Jan 2015
    Messages:
    5
    Likes Received:
    5
    • Like Like x 1
  8. gearjunkie

    gearjunkie Well-Known Member
    VIP

    Joined:
    28 Aug 2014
    Messages:
    454
    Likes Received:
    481
    • Like Like x 1
  9. caXXXXka

    caXXXXka Member

    Joined:
    26 Nov 2015
    Messages:
    2
    Likes Received:
    2
    Hey guys
    can you help me please with this capture?
     

    Attached Files:

    • Like Like x 1
  10. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    @caXXXXka will give it a shot.
    --- Double Post Merged, 1 Dec 2015, Original Post Date: 1 Dec 2015 ---
    Sadly your capture is bad:

    pyrit -r Downloads/Netgear30-01.cap analyze
    Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com
    This code is distributed under the GNU General Public License v3+

    Parsing file 'Downloads/Netgear30-01.cap' (1/1)...
    Parsed 57 packets (57 802.11-packets), got 1 AP(s)

    #1: AccessPoint 04:a1:51:d8:cc:3e ('NETGEAR30'):
    #1: Station c0:63:94:0e:92:27
    #2: Station cc:20:e8:2e:ce:0e
    #3: Station 34:23:87:57:cf:3a, 56 handshake(s):
    #1: HMAC_SHA1_AES, bad, spread 1
    #2: HMAC_SHA1_AES, bad, spread 1
    #3: HMAC_SHA1_AES, bad, spread 1
    #4: HMAC_SHA1_AES, bad, spread 1
    #5: HMAC_SHA1_AES, bad, spread 1
    #6: HMAC_SHA1_AES, bad, spread 1
    #7: HMAC_SHA1_AES, bad, spread 1
    #8: HMAC_SHA1_AES, bad, spread 1
    #9: HMAC_SHA1_AES, bad, spread 1
    #10: HMAC_SHA1_AES, bad, spread 1
    #11: HMAC_SHA1_AES, bad, spread 1
    #12: HMAC_SHA1_AES, bad, spread 1
    #13: HMAC_SHA1_AES, bad, spread 1
    #14: HMAC_SHA1_AES, bad, spread 1
    #15: HMAC_SHA1_AES, bad, spread 1
    #16: HMAC_SHA1_AES, bad, spread 1
    #17: HMAC_SHA1_AES, bad, spread 1
    #18: HMAC_SHA1_AES, bad, spread 1
    #19: HMAC_SHA1_AES, bad, spread 1
    #20: HMAC_SHA1_AES, bad, spread 1
    #21: HMAC_SHA1_AES, bad, spread 14
    #22: HMAC_SHA1_AES, bad, spread 14
    #23: HMAC_SHA1_AES, bad, spread 14
    #24: HMAC_SHA1_AES, bad, spread 14
    #25: HMAC_SHA1_AES, bad, spread 14
    #26: HMAC_SHA1_AES, bad, spread 14
    #27: HMAC_SHA1_AES, bad, spread 14
    #28: HMAC_SHA1_AES, bad, spread 15
    #29: HMAC_SHA1_AES, bad, spread 15
    #30: HMAC_SHA1_AES, bad, spread 15
    #31: HMAC_SHA1_AES, bad, spread 15
    #32: HMAC_SHA1_AES, bad, spread 15
    #33: HMAC_SHA1_AES, bad, spread 15
    #34: HMAC_SHA1_AES, bad, spread 16
    #35: HMAC_SHA1_AES, bad, spread 16
    #36: HMAC_SHA1_AES, bad, spread 16
    #37: HMAC_SHA1_AES, bad, spread 16
    #38: HMAC_SHA1_AES, bad, spread 16
    #39: HMAC_SHA1_AES, bad, spread 16
    #40: HMAC_SHA1_AES, bad, spread 16
    #41: HMAC_SHA1_AES, bad, spread 16
    #42: HMAC_SHA1_AES, bad, spread 17
    #43: HMAC_SHA1_AES, bad, spread 17
    #44: HMAC_SHA1_AES, bad, spread 17
    #45: HMAC_SHA1_AES, bad, spread 17
    #46: HMAC_SHA1_AES, bad, spread 17
    #47: HMAC_SHA1_AES, bad, spread 29
    #48: HMAC_SHA1_AES, bad, spread 30
    #49: HMAC_SHA1_AES, bad, spread 30
    #50: HMAC_SHA1_AES, bad, spread 30
    #51: HMAC_SHA1_AES, bad, spread 30
    #52: HMAC_SHA1_AES, bad, spread 31
    #53: HMAC_SHA1_AES, bad, spread 31
    #54: HMAC_SHA1_AES, bad, spread 32
    #55: HMAC_SHA1_AES, bad, spread 32
    #56: HMAC_SHA1_AES, bad, spread 32
    #4: Station 68:a8:6d:42:86:3c
    #5: Station b8:ff:61:88:22:c8


    No use testing passwords against it
     
    • Like Like x 1
  11. caXXXXka

    caXXXXka Member

    Joined:
    26 Nov 2015
    Messages:
    2
    Likes Received:
    2
    • Like Like x 1
  12. Jville808

    Jville808 Member

    Joined:
    6 Dec 2015
    Messages:
    2
    Likes Received:
    2
    Nice list! ...just what I was looking for. I'm having trouble with this .CAP however...there's several 4-way handshakes from several routers nearby, but the Netgear06 by far has the strongest signal. I'm not sure if it's my .CAP file (and all the different routers/handshakes), the word-list, my CPU or any combination of those.
     

    Attached Files:

    #232 Jville808, 6 Dec 2015
    Last edited: 6 Dec 2015
    • Like Like x 1
  13. gearjunkie

    gearjunkie Well-Known Member
    VIP

    Joined:
    28 Aug 2014
    Messages:
    454
    Likes Received:
    481
    I see 35 APs with lots of handshakes but no SSIDs. There is no way to crack a handshake without the corresponding SSID.
     
    • Like Like x 1
  14. Jville808

    Jville808 Member

    Joined:
    6 Dec 2015
    Messages:
    2
    Likes Received:
    2
    The SSID that had me find this forum/post is Netgear06. I was wondering how people have been posting just their .CAP files and no SSID's or IP's. I've only ever used CommView and aircrack-ng for the most part...and I'm sure you know you have to supply that info on aircrack-ng. I take it you guys are running much better than my combo.

    I just created a Kali 2.0 VM with VMware Workstation since this post...looking forward to learning that.

    But yeah, Netgear06 is the SSID targeted on that file, though as I said, I caught a handful of others as well. I ran it through the wordlist last night (on aircrack), and didn't come up with anything. It could have been my setup though...it took like 4 hours or something with my laptop at around 99% CPU usage...I thought it was going to fry that thing lol
     
    • Like Like x 1
  15. gearjunkie

    gearjunkie Well-Known Member
    VIP

    Joined:
    28 Aug 2014
    Messages:
    454
    Likes Received:
    481
    You will have to capture a packet with the SSID in it as telling me is not enough. If its somewhere in there and I missed it, let me know the packet number.
     
    • Agree Agree x 1
  16. mezcalsonique

    mezcalsonique Active Member

    Joined:
    11 Jul 2014
    Messages:
    25
    Likes Received:
    25
    Anyone having trouble uploading (capture) files? I've used wpaclean & cleaned the capture to a tiny (684 bytes) - doesn't seem to matter how small a file is I attach, I just get an error box (The Following error occurred - There was a problem uploading your file - Negear24.cap).

    Any help would be appreciated, mez

    PS. I've successfully uploaded captures before after using wpaclean (thanks gearjunkie) to reduce their size - can't work out why this time I'm having problems (can't even upload a next-to-blank text file [1 byte in size]). I have a capture from a brand new Netgear Nighthawk router that I'm 99% sure hasn't been changed (at the time I captured the handshake) from its default PSK that the current version (1.05) wordlist won't resolve... Thanks, m.
     
    • Like Like x 1
  17. Mr Wolf

    Mr Wolf Well-Known Member

    Joined:
    1 Jan 2015
    Messages:
    5
    Likes Received:
    5
    Perhaps, you can give a try zipping the files.
     
    • Like Like x 1
  18. mezcalsonique

    mezcalsonique Active Member

    Joined:
    11 Jul 2014
    Messages:
    25
    Likes Received:
    25
    Uploads working today... Anyway, as mentioned above please find attached a capture that most likely contains adjective-noun combinations not yet in v1.05 of this excellent wordlist. Happy hunting, mez
    --- Double Post Merged, 23 Dec 2015, Original Post Date: 23 Dec 2015 ---
    Thanks for the reply - tried again today & uploads are working again :) - Cheers, mez
     

    Attached Files:

    • Like Like x 1
  19. gearjunkie

    gearjunkie Well-Known Member
    VIP

    Joined:
    28 Aug 2014
    Messages:
    454
    Likes Received:
    481
    That is a bad capture. Please do another capture.

    Code:
    Select All
    # pyrit -r NETGEAR24.cap analyze Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com This code is distributed under the GNU General Public License v3+ Parsing file 'NETGEAR24.cap' (1/1)... Parsed 3 packets (3 802.11-packets), got 1 AP(s) #1: AccessPoint a0:63:91:df:f9:08 ('NETGEAR24'): #1: Station 50:65:f3:eb:6f:e9, 1 handshake(s): #1: HMAC_SHA1_AES, bad, spread 1
     
    • Like Like x 1
  20. mezcalsonique

    mezcalsonique Active Member

    Joined:
    11 Jul 2014
    Messages:
    25
    Likes Received:
    25
    Thanks gearjunkie,

    Usually I confirm airodump-ng's announcement of a handshake by using cowpatty to check for a valid handshake. What are the recommended & the most foolproof ways to confirm the handshake is valid? Why does aircrack-ng run a dictionary attack against a non-valid capture? I'd really appreciate some feedback on this issue as I may have captured other handshakes that I verified as valid that were not & hence had no chance of resolving...

    Wishing a Merry Christmas & a Happy New Year to you & all members here.

    Regards,

    mez
     
    • Like Like x 1

Share This Page

Loading...