@ [BCOLOR=rgb(240, 240, 240)][BCOLOR=rgb(240, 240, 240)]gearjunkie[/BCOLOR] [/BCOLOR]Thanks for Utility. @[BCOLOR=rgb(240, 240, 240)][BCOLOR=rgb(240, 240, 240)]PhoenixCoder[/BCOLOR] thanks for the link.[/BCOLOR] [BCOLOR=rgb(248, 251, 253)] Country : Pakistan Not [/BCOLOR][BCOLOR=rgb(248, 251, 253)]success with [/BCOLOR][BCOLOR=rgb(248, 251, 253)] my own common dictionary [/BCOLOR] gpuhash.me site [BCOLOR=rgb(248, 251, 253)] Essid: [/BCOLOR]OSAMA NETWORK [BCOLOR=rgb(248, 251, 253)]Bssid: [/BCOLOR]30-B5-C2-BB-E2-3C [BCOLOR=rgb(248, 251, 253)]Essid: [/BCOLOR]DELTA NETWORK [BCOLOR=rgb(248, 251, 253)]Bssid: [/BCOLOR]E8-94-F6-F7-F5-6E [BCOLOR=rgb(248, 251, 253)]Essid: [/BCOLOR]DELTA NETWORKS (MM) [BCOLOR=rgb(248, 251, 253)]Bssid: [/BCOLOR]E8-DE-27-61-53-9E Thanks in advance. --- Double Post Merged, 17 Jan 2016, Original Post Date: 17 Jan 2016 --- Find the attachment.
Even though I vowed to avoid your posts, you finally started following the rules (albeit it took several times to do so). So as a gesture of goodwill and to prove your accusations of me ignoring due to you not donating is false (which was ridiculous in the first place but i digress). Here is the cracked password: Session.Name...: oclhashcat Status.........: Cracked Input.Mode.....: Mask (?d?d?d?d?d?d?d?d?d?d) [10] Hash.Target....: arssynergy@unifibiz (18:f4:6a:23:75:23 <-> 1c:a5:33:8a:20:c9) Hash.Type......: WPA/WPA2 Time.Started...: Sat Jan 16 07:43:08 2016 (1 hours, 32 mins) Recovered......: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts Progress.......: 9244815360/10000000000 (92.45%) Rejected.......: 0/9244815360 (0.00%) Restore.Point..: 924413952/1000000000 (92.44%) arssynergy@unifibiz:18f46a237523:1ca5338a20c9:0122409029
Thank you very much. Just learned how to clean caps. Im also trying to run some million pass list using gpu using pyrit. But still getting 1200k/ps. So failed
Hey I'd really appreciate if you can decrypt any of the wpa handshakes from my attachment file. Thanks in advance for ur time and effort.
Its your lucky day... I picked a set of uppercase letters (Z,Y,X,W,V) to use as the first letter in a brute force attack and halfway through found the password: UPC577872:c44202614bb5:e840f2b75e3c:XJWGMKJR
[BCOLOR=rgb(248, 251, 253)]Country : China I tried weak pass and birthday combination of 8, 9 and 10 letters[/BCOLOR] [BCOLOR=rgb(248, 251, 253)]Essid: [/BCOLOR][BCOLOR=rgb(250, 250, 250)]V.D[/BCOLOR] [BCOLOR=rgb(248, 251, 253)]Bssid: [/BCOLOR][BCOLOR=rgb(250, 250, 250)]A4-56-02-2D-47-51[/BCOLOR] [BCOLOR=rgb(248, 251, 253)]Essid: [/BCOLOR][BCOLOR=rgb(250, 250, 250)]jiule0929[/BCOLOR] [BCOLOR=rgb(248, 251, 253)]Bssid: [/BCOLOR][BCOLOR=rgb(250, 250, 250)]00-25-86-2F-48-64[/BCOLOR] [BCOLOR=rgb(248, 251, 253)]Essid: [/BCOLOR]guan-home [BCOLOR=rgb(248, 251, 253)]Bssid: [/BCOLOR][BCOLOR=rgb(250, 250, 250)]A8-57-4E-02-BB-F8 [/BCOLOR] [BCOLOR=rgb(250, 250, 250)] Thanks a lot guys![/BCOLOR]
[BCOLOR=rgb(250, 250, 250)]hi for all, anyone help me[/BCOLOR] [BCOLOR=rgb(250, 250, 250)][/BCOLOR] [BCOLOR=rgb(250, 250, 250)]Router: TP-LINK[/BCOLOR] [BCOLOR=rgb(250, 250, 250)]SSID: [/BCOLOR]n3soo [BCOLOR=rgb(250, 250, 250)]MAC Address: [/BCOLOR]C4-6E-1F-E7-85-12 [BCOLOR=rgb(250, 250, 250)]Country: Turkey[/BCOLOR] [BCOLOR=rgb(250, 250, 250)]pass: 8 D, 9 D, your wordlist[/BCOLOR] [BCOLOR=rgb(250, 250, 250)][/BCOLOR]
Hi, please can someone help me ESSID: WebCubeNew-B904 BSSID: 34:cd:be:c3:b9:04 Country: Italy ESSID: FASTWEB-1-ygneIF00v2u9 BSSID: f0:84:2f:c4:08:83 Country: Italy Thanks a lot, .
Not a good capture, may lead to false negatives when testing # pyrit -r Downloads/n3soo\ \(C4-6E-1F-E7-85-12\).cap analyze Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com This code is distributed under the GNU General Public License v3+ Parsing file 'Downloads/n3soo (C4-6E-1F-E7-85-12).cap' (1/1)... Parsed 3 packets (3 802.11-packets), got 1 AP(s) #1: AccessPoint c4:6e:1f:e7:85:12 ('n3soo'): #1: Station 38:2d:d1:03:04:6d, 1 handshake(s): #1: HMAC_SHA1_AES, bad, spread 1 --- Double Post Merged, 22 Jan 2016, Original Post Date: 22 Jan 2016 --- Same goes for these. Not a good capture, may lead to false negatives when testing: # pyrit -r Downloads/2.cap analyze Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com This code is distributed under the GNU General Public License v3+ Parsing file 'Downloads/2.cap' (1/1)... Parsed 6 packets (6 802.11-packets), got 2 AP(s) #1: AccessPoint f0:84:2f:c4:08:83 ('FASTWEB-1-ygneIF00v2u9'): #1: Station 8c:fa:ba:c2:88:d1, 1 handshake(s): #1: HMAC_SHA1_AES, bad, spread 1 #2: AccessPoint 34:cd:be:c3:b9:04 ('WebCubeNew-B904'): #1: Station cc:d2:9b:72:e5:d9, 1 handshake(s): #1: HMAC_SHA1_AES, bad, spread 1
essid Telstra54D9A0 bssid 30:91:8F:549:A0 10HEX Upper Always 7 Digits 3 Letters in key no character appears more than twice. thanks in advance
only have CPU but i think i can do it myself. my question is.. does anyone have some italian dictionaryes?(alice uses 23 or 24 chars(default ones that i found are like this: Alice-00000000 - pass: jkvamn58t1uh76q81ff4ncrn, Alice-00000000 - pass 3becdydt9hz34g9cqdcbjdoy,Vodafone-00000000 - pass:6d1c13c1572013d2f9cde54, Telecom about 16, couldn't crack one..yet and with pyrit that's impossible)maybe for the changed ones. those txt files that i found are useless. thank you in advance
[BCOLOR=rgb(250, 250, 250)]Plz Try dictionary.[/BCOLOR] [BCOLOR=rgb(250, 250, 250)]Thanks in advance....[/BCOLOR]
Please help me crack for it. [BCOLOR=rgb(250, 250, 250)]Assumptions of the password may be phone number 0198843367 with combination of some letters or numbers. [/BCOLOR] [BCOLOR=rgb(250, 250, 250)]Vendor: Unifi[/BCOLOR] [BCOLOR=rgb(250, 250, 250)]SSID: chengxin@unifi[/BCOLOR] [BCOLOR=rgb(250, 250, 250)]MAC Address: 1C-A5-33-28-16-55[/BCOLOR] [BCOLOR=rgb(250, 250, 250)]Country : Malaysia[/BCOLOR] [BCOLOR=rgb(250, 250, 250)][/BCOLOR]