*Sigh* At this point I feel I am beating a dead horse. To all members if you need help cracking your WPA handshakes follow the rules that are laid out in the first page of this forum posted by Mr.Penguin. @badchicken saying you "tried everything" does not help anyone. However saying things like the ones below DOES: I have attempted to crack the network/s using the following methods ......... I have tried the following password/s formats ....... I believe the network could be in this format/s I believe it to be a default password? Yes/No Moreover including the info below (or as much as you can) will guide those who attempt to crack the WPA in the right direction Mac Address Network Name ISP Model Country Phone number format/s In any case, the following attacks were attempted and failed against both handshakes Super-WPAv2 Dict 8 Digit Bruteforce Netgear_0-99 Netgear_000-999 SkullSecurity Dict Remaining attacks to be attempted: 0<8 Digit> 01<8 Digit>
So you apologize then repeat the problem? The main issue is sharing the handshakes without any background info or what you have tried that didn't work.
Yes it got sent before i could finsh. Its a belkin and netgear from the usa.Ive tried reaver ive tried bully pixie dust.There not locked by the wash wlan0mon.Ive tried every thing from skull security.Plus ive tryed rock you many others private and public word lists thats 30 gigs. Ive tried all default passwords.Plus the gear downloaded from here.
no body answer me!!! since 30/08/2015 https://xiaopan.co/forums/threads/wpa-wpa2-auditing-service.3739/page-48#post-29509
Bumping old requests is against the forum rules but checking my task history, I see the following were attempted and failed: 20 GB and 36 GB dictionaries 8 Digit 8 Hex lower 8 Hex upper Will try 05<9 digits> and let u know
thanx man, i tried: 8 Digit, 9 Digit, 05xxxxxxxxx .......... without any result thank you for your answer
Hello all I try to crack these handshake, i use custom list /mobile number/land number/8 digits/tp-link assistant . but it can't cracked . Note1: "t1.cap" this handshake for tp-link 740n & last password cracked is "sara2007". Note2: "aw1.cap" Router is "Sagem f@st 2704" (( I think )) from Orange.
Hi Friend, May help me try below...thanks. Vendor: Unifi or Maxis ESSID : GWL MAC Address: 1C-87-2C-C6-82-34 Vendor: Unifi or Maxis ESSID : Pete MAC Address: 9C-97-26-40-84-89
@clarkswalabis This is not a personal service for you, any cracked will be posted, Read the rules e) Do not continually ask for your cap/s to be cracked. Once is enough. You have been told several times Anymore will be reported and deleted Your caps also, also includes a ban. Rules for posting caps Failure to break any of the rules above may result in a forum ban.
Hi, I've tried to run mask tables on my laptop, and am only averaging about 1500k/s. I can't get my ancient video card to run opencl on anything (windows or linux), and would REALLY appreciate some help w/ processing power. Tried running Reaver on all three w/ no sucess, even with changing settings and running scripts to start and stop processes. 01-200.cap is the main one I'm trying to figure out. 01-200 is a Netgear WNDR3400v3. I have tried the NETGEARxx list and '200%l%l%l%l%l' w/ no results. 02-lnkden is a Linksys (not sure of the model). I have not tried anything on this one yet. 03-lnkext is a Netgear router as far as I know (when looking at logs in Wireshark). 02-lnkden is on the same site (03-lnkext is acting as a repeater, AFAIK), and may have the same PW. I have also run the NETGEARxx wordlist on this one, again w/ no results. Thanks for any help in advance!
SSID: ATT870 Vendor: 2Wire Inc MAC: 94:C1:50:E2:AC:FA Format: Probably 10 Digits: 0-9 Link: https://www.dropbox.com/s/l1hwzk961koxbj...hccap?dl=0
Going through some of the older captures here... Both captures above were tested against 8 and 9 digits, Italian phone numbers, and my word lists without any results. --- Double Post Merged, 29 Oct 2015, Original Post Date: 29 Oct 2015 --- Lucky for you both captures were cracked! Speedy-DABF56:90671cdabf5c:a49a58a32dea:1523037026 tequeresmatar:4c257860c1bb:786a890ea6d8:1135953020 --- Double Post Merged, 29 Oct 2015 --- I have tested this against 8 and 9 digits, Australian phone numbers, and my word lists without any luck. As mentioned before, it is very likely to be still on its default 10 upper hex. --- Double Post Merged, 29 Oct 2015 --- Here's your key: vimala:68489835d8b5:68764f870c1c:19960822
Sorry but nothing was found after testing again 9 digits, Malaysian phones, and my word lists. --- Double Post Merged, 30 Oct 2015, Original Post Date: 30 Oct 2015 --- Nothing was found here after testing against 8 and 9 digits, Turkey phones, and my word lists. --- Double Post Merged, 30 Oct 2015 --- Here is your key: Mike:b8e9378c1884:f07959e676c8:13131313 --- Double Post Merged, 30 Oct 2015 --- You have a bad capture here. --- Double Post Merged, 30 Oct 2015 --- Tested both and found one: fadhlied@unifi:94fbb3843ac5:dc9b9c987b1f:0123837734