Works for me, but i reuploaded to another site for you. http://s000.tinyupload.com/?file_id=42044400085988729643 - Netgear Wordlist - v1.05 http://s000.tinyupload.com/?file_id=00375140742816798553 - Mycharterwifi Wordlist - v1.05 Hope that helps. --- Double Post Merged, 8 Nov 2015, Original Post Date: 8 Nov 2015 --- I would expect most updates from now on will be only a few words at most to adjective/noun, maybe just have a README file that can be downloaded or just as a post, that way we can quickly add to our existing lists for quicker cracking times of old captures and there is no need for downloading 9mb (340mb uncompressed) files every update. I personally never use adjective_noun_1d, adjective_noun_3d, adjective_noun, i combine at cracking time. Therefore i would personally greatly benefit from listing the updates rather then redownloading the entire list every update. (i'd assume others will too) Version 1.05: The following adjectives and nouns where added to the lists in this version, and applied to adjective_noun_1d, adjective_noun_3d, adjective_noun: adjective: ------------ ancient antique nouns: --------- airplane apple Thanks again for all your work gearjunkie
Dear blu3ski3s, Thankyou for taking the trouble+++ and effort to put another link in. I am grateful to you too gearjunkie and you blu3ski3s, for all the effort+++++. Link did not like unauthenticated https:, but I changed location and got it on the third location go. What a variety of responses between Windows 7, XP, Internet Explorer, Safari, Google Chrome and Firefox. (Laughing bigtime now but at my own trouble, not at the gracious effort by you both. Can confirm in all the different versions including previous V1.04, I have never had a knockback from NetgearXXX, SSID, using this list. Total number of tests around 15-20 with full completion. Only time there is difficulty is when its out of range and cant capture the return. Otherwise fully positive feedback for the list. Thankyou again, Garry
Looks like what you are interested in is a changelog. I will find some way to add it in. In the meantime, the last 2 words (adjectives) added were manic and gifted.
Hey guys, know this thread is rather old. Curious if anyone would still like to run a few that didn't return any hits in the 1.05 lists for me.
This is a long thread but we are still accepting new handshakes to discover new words. Both the handshakes you uploaded are bad so please do a re-capture. Code: Select All # pyrit -r NETGEAR64.cap analyze Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com This code is distributed under the GNU General Public License v3+ Parsing file 'NETGEAR64.cap' (1/1)... Parsed 3 packets (3 802.11-packets), got 1 AP(s) #1: AccessPoint 6c:b0:ce:ff:3e:68 ('NETGEAR64'): #1: Station 60:02:b4:44:7b:d6, 1 handshake(s): #1: HMAC_SHA1_AES, bad, spread 1 # pyrit -r NETGEAR92.cap analyze Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com This code is distributed under the GNU General Public License v3+ Parsing file 'NETGEAR92.cap' (1/1)... Parsed 35 packets (35 802.11-packets), got 1 AP(s) #1: AccessPoint a0:63:91:1e:a4:3a ('NETGEAR92'): #1: Station 00:c0:ca:5a:35:de #2: Station 48:50:73:bb:cc:c8 #3: Station 40:e2:30:7d:23:91 No valid EAOPL-handshake + ESSID detected. --- Double Post Merged, 28 Nov 2015, Original Post Date: 28 Nov 2015 --- Your handshake is bad too so please re-capture.
Hi! Have you ever tried mine, by chance? https://xiaopan.co/forums/threads/netgearxx-wordlist.6571/page-5#post-24936 The router is in Italy, by the way. Thanks!
That was a while ago so I had to check my old logs. Yes, I have tested yours and it is not in my large adjective+noun list.
@caXXXXka will give it a shot. --- Double Post Merged, 1 Dec 2015, Original Post Date: 1 Dec 2015 --- Sadly your capture is bad: pyrit -r Downloads/Netgear30-01.cap analyze Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com This code is distributed under the GNU General Public License v3+ Parsing file 'Downloads/Netgear30-01.cap' (1/1)... Parsed 57 packets (57 802.11-packets), got 1 AP(s) #1: AccessPoint 04:a1:51:d8:cc:3e ('NETGEAR30'): #1: Station c0:63:94:0e:92:27 #2: Station cc:20:e8:2e:ce:0e #3: Station 34:23:87:57:cf:3a, 56 handshake(s): #1: HMAC_SHA1_AES, bad, spread 1 #2: HMAC_SHA1_AES, bad, spread 1 #3: HMAC_SHA1_AES, bad, spread 1 #4: HMAC_SHA1_AES, bad, spread 1 #5: HMAC_SHA1_AES, bad, spread 1 #6: HMAC_SHA1_AES, bad, spread 1 #7: HMAC_SHA1_AES, bad, spread 1 #8: HMAC_SHA1_AES, bad, spread 1 #9: HMAC_SHA1_AES, bad, spread 1 #10: HMAC_SHA1_AES, bad, spread 1 #11: HMAC_SHA1_AES, bad, spread 1 #12: HMAC_SHA1_AES, bad, spread 1 #13: HMAC_SHA1_AES, bad, spread 1 #14: HMAC_SHA1_AES, bad, spread 1 #15: HMAC_SHA1_AES, bad, spread 1 #16: HMAC_SHA1_AES, bad, spread 1 #17: HMAC_SHA1_AES, bad, spread 1 #18: HMAC_SHA1_AES, bad, spread 1 #19: HMAC_SHA1_AES, bad, spread 1 #20: HMAC_SHA1_AES, bad, spread 1 #21: HMAC_SHA1_AES, bad, spread 14 #22: HMAC_SHA1_AES, bad, spread 14 #23: HMAC_SHA1_AES, bad, spread 14 #24: HMAC_SHA1_AES, bad, spread 14 #25: HMAC_SHA1_AES, bad, spread 14 #26: HMAC_SHA1_AES, bad, spread 14 #27: HMAC_SHA1_AES, bad, spread 14 #28: HMAC_SHA1_AES, bad, spread 15 #29: HMAC_SHA1_AES, bad, spread 15 #30: HMAC_SHA1_AES, bad, spread 15 #31: HMAC_SHA1_AES, bad, spread 15 #32: HMAC_SHA1_AES, bad, spread 15 #33: HMAC_SHA1_AES, bad, spread 15 #34: HMAC_SHA1_AES, bad, spread 16 #35: HMAC_SHA1_AES, bad, spread 16 #36: HMAC_SHA1_AES, bad, spread 16 #37: HMAC_SHA1_AES, bad, spread 16 #38: HMAC_SHA1_AES, bad, spread 16 #39: HMAC_SHA1_AES, bad, spread 16 #40: HMAC_SHA1_AES, bad, spread 16 #41: HMAC_SHA1_AES, bad, spread 16 #42: HMAC_SHA1_AES, bad, spread 17 #43: HMAC_SHA1_AES, bad, spread 17 #44: HMAC_SHA1_AES, bad, spread 17 #45: HMAC_SHA1_AES, bad, spread 17 #46: HMAC_SHA1_AES, bad, spread 17 #47: HMAC_SHA1_AES, bad, spread 29 #48: HMAC_SHA1_AES, bad, spread 30 #49: HMAC_SHA1_AES, bad, spread 30 #50: HMAC_SHA1_AES, bad, spread 30 #51: HMAC_SHA1_AES, bad, spread 30 #52: HMAC_SHA1_AES, bad, spread 31 #53: HMAC_SHA1_AES, bad, spread 31 #54: HMAC_SHA1_AES, bad, spread 32 #55: HMAC_SHA1_AES, bad, spread 32 #56: HMAC_SHA1_AES, bad, spread 32 #4: Station 68:a8:6d:42:86:3c #5: Station b8:ff:61:88:22:c8 No use testing passwords against it
@PhoenixCoder thank you for quick answer! I doing a new capture and analyse with pyrit before i upload next time.
Nice list! ...just what I was looking for. I'm having trouble with this .CAP however...there's several 4-way handshakes from several routers nearby, but the Netgear06 by far has the strongest signal. I'm not sure if it's my .CAP file (and all the different routers/handshakes), the word-list, my CPU or any combination of those.
I see 35 APs with lots of handshakes but no SSIDs. There is no way to crack a handshake without the corresponding SSID.
The SSID that had me find this forum/post is Netgear06. I was wondering how people have been posting just their .CAP files and no SSID's or IP's. I've only ever used CommView and aircrack-ng for the most part...and I'm sure you know you have to supply that info on aircrack-ng. I take it you guys are running much better than my combo. I just created a Kali 2.0 VM with VMware Workstation since this post...looking forward to learning that. But yeah, Netgear06 is the SSID targeted on that file, though as I said, I caught a handful of others as well. I ran it through the wordlist last night (on aircrack), and didn't come up with anything. It could have been my setup though...it took like 4 hours or something with my laptop at around 99% CPU usage...I thought it was going to fry that thing lol
You will have to capture a packet with the SSID in it as telling me is not enough. If its somewhere in there and I missed it, let me know the packet number.
Anyone having trouble uploading (capture) files? I've used wpaclean & cleaned the capture to a tiny (684 bytes) - doesn't seem to matter how small a file is I attach, I just get an error box (The Following error occurred - There was a problem uploading your file - Negear24.cap). Any help would be appreciated, mez PS. I've successfully uploaded captures before after using wpaclean (thanks gearjunkie) to reduce their size - can't work out why this time I'm having problems (can't even upload a next-to-blank text file [1 byte in size]). I have a capture from a brand new Netgear Nighthawk router that I'm 99% sure hasn't been changed (at the time I captured the handshake) from its default PSK that the current version (1.05) wordlist won't resolve... Thanks, m.
Uploads working today... Anyway, as mentioned above please find attached a capture that most likely contains adjective-noun combinations not yet in v1.05 of this excellent wordlist. Happy hunting, mez --- Double Post Merged, 23 Dec 2015, Original Post Date: 23 Dec 2015 --- Thanks for the reply - tried again today & uploads are working again - Cheers, mez
That is a bad capture. Please do another capture. Code: Select All # pyrit -r NETGEAR24.cap analyze Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com This code is distributed under the GNU General Public License v3+ Parsing file 'NETGEAR24.cap' (1/1)... Parsed 3 packets (3 802.11-packets), got 1 AP(s) #1: AccessPoint a0:63:91:df:f9:08 ('NETGEAR24'): #1: Station 50:65:f3:eb:6f:e9, 1 handshake(s): #1: HMAC_SHA1_AES, bad, spread 1
Thanks gearjunkie, Usually I confirm airodump-ng's announcement of a handshake by using cowpatty to check for a valid handshake. What are the recommended & the most foolproof ways to confirm the handshake is valid? Why does aircrack-ng run a dictionary attack against a non-valid capture? I'd really appreciate some feedback on this issue as I may have captured other handshakes that I verified as valid that were not & hence had no chance of resolving... Wishing a Merry Christmas & a Happy New Year to you & all members here. Regards, mez