They would be tiny if you Cleaned Your Caps You are doing something wrong, if you Clean them then test your cleaned cap."not rocket science"
i dont know what is wrong...im try connect with 3 device but all fails[/QUOTE] Your capture is bad so its possible this is a false positive. # pyrit -r duanza86\@unifi.cap analyze Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com This code is distributed under the GNU General Public License v3+ Parsing file '[email protected]' (1/1)... Parsed 5 packets (5 802.11-packets), got 1 AP(s) #1: AccessPoint 94:fb:b3:f3:be:45 ('duanza86@unifi'): #1: Station 00:e0:4c:83:34:11, 2 handshake(s): #1: HMAC_SHA1_AES, bad, spread 1 #2: HMAC_SHA1_AES, bad, spread 1
Ok; I finally think I got it. I'm not sure WTF I did last time, but I tried again with pyrit, and came up with different results this time. The file sizes are different than when I first cleaned them, and found that one of them was bad. Thanks for the advice and the help. 00west.cap - SSID= 200 WEST FOY 00lnkdenext.cap - SSID= linksys_den_EXT lnk-01.cap - SSID= linksys_den (this one was bad)
I will take a look at the captures you just posted. What country are these from? I went through both you captures and found one: linksys_den_EXT:10a5d06a368f:4a94fc7163f6:workshop
Awesome, thank you! They are from the US. I'll send you some food if you can crack the other one. Maybe something non-perishable that you can only get here? Just a thought. Thanks again!
I got chuckle thinking of you sending me a fruitcake Seriously, thanks for your offer but it is not necessary. I will try out US phone numbers and my large adjective-noun word list on your first capture.
hey boys , been reading for a while and first post now.. wander if anyone can give me a hand with a AP please my old Dell studio cant handle all that cracking
Good day @gearjunkie , below i upload few recaptures file, dunno still bad or not...please try and see...thanks... Vendor: Unifi SSID: wifiunifi MAC Address: C8-D3-A3-DC-5B-B0 Password format: no idea Country : Malaysia Vendor: Unifi SSID: kwtee92@unifi MAC Address: 94-FB-B3-85-2A-C5 Password format: no idea Country : Malaysia Vendor: Unifi SSID: 3994522@unifi MAC Address: BC-96-81-20-FC-37 Password format: no idea Country : Malaysia
Sorry but the other one is not a US phone number (10 digits) or in the large Netgear adjective-noun wordlist that I am using. --- Double Post Merged, 24 Nov 2015, Original Post Date: 24 Nov 2015 --- Sorry for the slow reply but only one of them is workable: Code: Select All Parsing file '[email protected]' (1/1)... Parsed 3 packets (3 802.11-packets), got 1 AP(s) #1: AccessPoint 94:fb:b3:85:2a:c5 ('kwtee92@unifi'): #1: Station 24:24:0e:0d:d3:f5, 1 handshake(s): #1: HMAC_SHA1_AES, workable, spread 1
Your capture is bad so its possible this is a false positive. # pyrit -r duanza86\@unifi.cap analyze Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com This code is distributed under the GNU General Public License v3+ Parsing file '[email protected]' (1/1)... Parsed 5 packets (5 802.11-packets), got 1 AP(s) #1: AccessPoint 94:fb:b3:f3:be:45 ('duanza86@unifi'): #1: Station 00:e0:4c:83:34:11, 2 handshake(s): #1: HMAC_SHA1_AES, bad, spread 1 #2: HMAC_SHA1_AES, bad, spread 1[/QUOTE] thnks alot for info bro....how about wt another handshake file?...waiting for good result.....
I have completed testing your one workable handshake (kwtee92@unifi) but nothing came up. --- Double Post Merged, 28 Nov 2015, Original Post Date: 28 Nov 2015 --- The handshake you posted was marked bad by pyrit so the result below might not work (false positive): besiktas:001ca80d8b6a:40f3089409bd:besiktas1990 --- Double Post Merged, 28 Nov 2015 --- thnks alot for info bro....how about wt another handshake file?...waiting for good result.....[/QUOTE] Sorry but nothing came up after testing your other handshake.
SSID: SUPERONLINE-WiFi_3947 MAC Address: F4:E3:FB:18:8D:46 Password format: WPA2-PKS TKIP+AES Country : TURKEY
GearJunkie the below handshake belongs to my sister wifi.... tried my best but i am not failing the challenge... Tried all my dictionaries but i ran outof Luck...I will apprecaite your help if you can crack it down. Essid: U Idiot MAC Address: 00:0C:F6:FE:B5:18 Password format: WPA-PKS TKIP Country : UAE Thank You.
[/QUOTE] Vendor: UNIFI SSID: chengxin@unifi Mac Address: 1C-A5-33-28-16-55 Country: Malaysia. Cap File: https://www.mediafire.com/?769xic96q5i5j1f The cap file is too big, unable to upload to xiaopan forum. I uploaded it to mediafire. Please help me find the key. Thanks.
This is also a bad capture. FYI, the default for this SSID is uppercase and digits of length 12. See the attached image below.
Hello , Can Someone Help me with This .CAP... Can Someone Tell me Whats The Password Please... i am 100% sure that password is 8 Characters Long only and Password is Found in "Common Wordlist" Dictionary File , Which is On GpuHash.com Site but me not able to Find that File anywhere on Internet ... And it's Highly Possible that Password is Only Digits Based (i cracked another one , Same Bssid whose password is Digits based "44567867" and also found that , that it's WPS PIN is the WPA password), Less Chances that it includes Lower alpha Too but one Thing For Sure , Password is only 8 Characters Long .... Me don't have Strong PC , i Hope Someone help me here.. So can someone Help me with this Cap...i And this Capture is Not Bad For Sure , GpuHash Showing Password Found (https://gpuhash.me/?menu=en-tasks-result&idreq=LmYkQvC93z) , aircrack also Accepting Handshake.... (Cousin Wifi Who Lives Next to my House So No Need To worry, Cracking WIFI totally Legal here ) Thanks in Advance... And Sorry For My English... Vendor : TP-LINK MAC : C4:E9:84:25:08:A0 Format : WPA2 CCMP Country : Pakistan (Not Sure) ESSID : Raza Chawla