Hi , Mr. Gearjunkie Can you try to hack WPA2 for me SSID : DrkChe Mac Address: : 64:70:02:3E:75:00 Router : TP Link WR740n Country:Serbia SSID : SINISA DIVERS Mac Address : CC:A2:23:5D:9E:48 Router : HG531 V1 Country : Serbia Thank you
Sorry but I went through all three handshakes with 8 digits, 9 digits (looks like Polish phone numbers are 9 digits too), and my word lists without any luck. It is very likely that the UPC handshake is still using the default of 8 uppercase letters but it will take me over a month to try that out.
Read The Rules @Francis Willson Also a lot of talktalk routers can be cracked with pixiewps If not the default key len is 8 char ABCDEFGHJKMNPQRTUVWXY346789 good luck with that.
@Francis Willson Also a lot of talktalk routers can be cracked with pixiewps Thank you, Would this still apply for Huawei routers?
Greetings, I have a cap from A TelstraXXXXXX AP, default for this is 10 hex upper currently`: mp64.exe -1 ?dABCDEF ?1?1?1?1?1?1?1?1?1?1?1 | oclHashcat64.exe -m 2500 Telstraout.hccap and as you expect its taking a while, have tried various wordlist , no avail. Can anyone else have a go for me. Thankyou to all.
hello again gearjunkie. provider : unifi mac : 94-FB-B3-C0-F9-63 Country: Malaysia Router Model: no idea Brand: probable huawei source : handshake capture is the only thing that goes thru via wifite WPS: off I have tried : gpu assisted EWSA brute mask 8,9,10 digits, 8,9,10 digits with common unifi prefixes & suffixes and 8 char small caps alphanumeric thank you
Sorry but nothing was found after going through 8 and 9 digits, Brazil phone numbers, and my word lists. --- Double Post Merged, 15 Jul 2015, Original Post Date: 15 Jul 2015 --- I went through both your captures against 8 and 9 digits, Pakistan phone numbers and my word lists... and found one of the key. Gringo:5cf8a130be05:f4ec38ba8686:arena123
Thanks foe the Gringo Hi , Mr. Gearjunkie Can you try to hack WPA2 for me Network Name: ZulfidemoNetwork-a28 Mac Address: 30-B5-C2-BB-E2-3C Password Length : No Idea
Sorry I have tested this against 8 and 9 digits, Syria and Egypt phone numbers, and my word lists without any luck. --- Double Post Merged, 19 Jul 2015, Original Post Date: 19 Jul 2015 --- Sorry this was also tested against 8 and 9 digits, Malaysia phone numbers. and my word lists without any luck. --- Double Post Merged, 19 Jul 2015 --- Found you key! 133169:109266deaa30:14cc20f01f01:09387731524 --- Double Post Merged, 19 Jul 2015 --- I have tested both you captures against 8 digits, 9 digits, Malaysian phone numbers with and without 'abc' prefix, and my word lists. One of the key was found yeemengwifi@unifi:74de2b599a0f:ccb255d79e2f:41151259 --- Double Post Merged, 20 Jul 2015 --- Which country did this originate from?
Hi Gear Junkies I have attached a new handshake essid: gencashgroup1 password possibililities are 10 digit mobile number or maybe 8 digit I have tried run into 100000 - 200000 random pass keys but failed
The first capture (abzar sayna) does not have a valid handshake in it. Out of the other three left, I managed to recover the keys for two of them. lizing mehr gostare iranian:b4527e510608:c8d15eb7e851:12345678mg Saman-6:5067f09326c2:940c6de51c3a:1357986420 --- Double Post Merged, 20 Jul 2015, Original Post Date: 20 Jul 2015 --- This might have a regular NETGEARXX SSID but the default key has been changed to the one below: NETGEAR56:28c68e478c90:fcc2de80951a:hollyfreya --- Double Post Merged, 21 Jul 2015 --- Sorry but nothing came up after testing this against 8, 9 and 10 digits (which should also cover Mexican phone numbers), and my word lists. The key is likely to be 10 upper HEX but it will take me too long to run through it. --- Double Post Merged, 21 Jul 2015 --- I have tested your handshakes against the usual and found the key for two of them: positiveminds:5cd998dcfbe8:f81a670c3dd6:50582297 BabyGees:000822c8cdfb:94fbb2c8f2b6:babygees1966
Thank you very much GerJunkie, but the key given for positiveminds is same as the old key and whenever i tried to connect it saying "can't connect to this network". Why is that showing like that? And what about the blaze essid?
Have they "you" changed the key? Get another capture and try the key against it , is mac filtering enabled ?? Also clean your handshakes there is no need for a 4mb handshake, it reduces traffic, and also shows you have made a effort. [BCOLOR=#ff0000][BCOLOR=#ff0000]Read The Rules[/BCOLOR][/BCOLOR] 4) Make it Easy a) Clean the cap e) Do not continually ask for your cap/s to be cracked. Once is enough
As meknb mentioned, there could be mac address filtering or you are too far away from the AP. Blaze had already been tested without any results.
Thank you for reply 1) If I change my mac address with the similar one that is allowed then am I able to connect to that network? 2) How to reduce the size of handshake less than 4mb and clean? Can you show how to reduce the size and clean. 3) I'm sorry if I have violated the rules, but I was just asking whether the password was found or not found so that I can know that the key is not from 8 digit numbers.
Hi can you help me with the following wpa, leave the data. Network Name:FIBRATV SJR189 MAC Address:B0:C5:54:A5:5B:C8 Country:Mexico Router Model: Dlink 610 or 615 Brandlink provider fibratv wps off Network Name:BERRY MAC Address:00:24:A1:6D:75:78 Country:Mexico Router Model: unknow Brand:Arris provider Telecable. wps off Network Name:AXTEL-935E MAC Address:04:8D:38:96:93:5E Country:Mexico Router Model: unknow Brand:NETCORE TECHNOLOGY provider AXTEL wps off Network Name:INFINITUM484961 MAC Address:A4:B1:E9:48:49:61 Country:Mexico Router Model: unknow Brand:TECHNICOLOR provider TELMEX wps off tanks.