Sorry, I have tried it with the extended adjective-noun list and still nothing. It has also been tested it against 8 digits, 9 digits, and my word lists just to make sure the password is not something simple. --- Double Post Merged, 13 Mar 2016, Original Post Date: 13 Mar 2016 --- This is a better handshake capture although it does not have the same SSID as the first one. The result is below: EE-ftn95a:5cdc96f1697d:80be056b9076:wrist-map-past --- Double Post Merged, 14 Mar 2016 --- Sorry, I have tested both captures against 8 and 9 digits, Malaysia phone numbers, and my word lists without any luck.
It is possible that your capture is bad. I cannot verify because it only has two out of the four eapol packets.
if it's in the adjective-noun list it will find it even with only two eapol.about the other tries.. i have to find some time first. thank you again
I am saying that there is a possibility the eapol packets are corrupted or not in sequence (eapol packet 1 and packet 2 are not from the same authentication sequence). It is not possible to verify the packets when there are only two eapol in the capture, unless you already know the password.
always used this type of hanshake. as long as pyrit starts, should be ok.cracked 2 netgears with 2 packets only. unfortunatelly i only have cpu, so for the 3 Gb of netgearxx passwd list, took me bout 4 hours to pass through. the other netgears took about 20 mins or so to find the right one.thank you for your time though
Need some help from you all here if you can discover the pass.. a) I have attempted to crack the network/s using the following methods: reaver. .nope. wps locked d) Network Name: lohsh e) ISP: Maxis Malaysia f) Model: Technicolor something.. g) Country: Malaysia h) Phone number format/s: could be 10 or 8 digits.. j) I believe it to be a default password? Yes/No: Probably a) I have attempted to crack the network/s using the following methods: reaver. .nope. wps locked d) Network Name: benny e) ISP: Maxis Malaysia f) Model: Technicolor something.. g) Country: Malaysia h) Phone number format/s: could be 10 or 8 digits.. j) I believe it to be a default password? Yes/No: Probably
Regarding the lohsh cap, I tried 8,9, and 10 digits. No luck. If i am not mistaken, Technicolor (Thompson) have a keyspace of 10 upperhex --- Double Post Merged, 18 Mar 2016, Original Post Date: 17 Mar 2016 --- Here you go, had to try multiple dictionaries after 8,9,and 10 digit attack failed. Wished I used my own wordlist from the beginning. Oh well ! Dlink:84c9b2c0062c:dccebc834bac:ABCD123456 Session.Name...: oclHashcat Status.........: Cracked Input.Mode.....: File (..\files\PhoenixCoder-WPA) [10] Hash.Target....: Dlink (84:c9:b2:c0:06:2c <-> dc:ce:bc:83:4b:ac) Hash.Type......: WPA/WPA2 Time.Started...: 59 secs Speed.GPU.#*...: 783.43 kH/s Recovered......: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts Progress.......: 49845492576/216719532941 (23.00%) Rejected.......: 0/1 (0.00%) HWMon.GPU.#1...: 100% Util, 66c Temp, N/A Fan HWMon.GPU.#2...: 88% Util, 66c Temp, N/A Fan Hope you found the WPA key useful
Hello everyone!! a) I have attempted to crack the network/s using the following methods: default password, mutating default passwords, common passwords that lazy people keep (I dont have a gpu so I cant run EWSA) b) I have tried the following password/s formats: c) Mac Address: fc:dd:55:09:9c:75 d) Network Name: MBLAZE-DF800i-9C75 e) ISP: MTS Mblaze f) Model: Shenzen dongle I believe g) Country: India h) Phone number format/s: NA i) I believe the network could be in this format/s: Not sure about it sorry j) I believe it to be a default password? Yes/No: No Thanks for all your effort!!! Regards
Using cap2hccap shows this error: [error ] unable to find valid handshakes. Running pyrit to analyze the cap file shows 5 access points: #1: AccessPoint 0c:d2:b5:3f:5a:8c ('None'): #2: AccessPoint be:30:7d:23:35:9c ('DIRECT-31-VIErA_thas610d'): #3: AccessPoint 30:b5:c2:bc:1d:1c ('House Stark>>!!'): #4: AccessPoint fc:dd:55:09:9c:75 ('MBLAZE-DF800i-9C75'): (284 handshake(s) with 144 marked as bad) #5: AccessPoint 54:b8:0a:52:c1:75 ('PCRA-ER,KOL'): I used aircrack to extract just the MBLAZE capture and create the hccap file but doubt it would be clean enough to effectively test. I would suggest collecting a cleaner capture for that network.
Thanks for the reply. Let me know in case it works out or not...otherwise ill get hold of a better CAP. Regards
Well there is no concrete way of knowing if it is a good or bad capture unless you already have the correct password but am running my usual list of attacks against it
Oh you're right, Janice Lim's was cracked. In any case, technicolor being 10 hex will take a significant amount of time but we may get lucky
May I remind you that if you would like your request to be taken seriously, it is recommended to abide by rule 2 As just throwing a cap file shows laziness and doesn't motivate people to put in the effort to crack it.
Hello everyone!! a) This network pops up at times for a few hours and I finally managed to capture a handshake decently.I tried using the common password (since its the default SSID), the SSID name itself and in mutated forms but no luck. b) I have tried the following password/s formats: password, admin, 123, airtel, and permuted/combined forms c) Mac Address: 24:1f:a0:c4:98:0d d) Network Name: Airtel-E5573-980D e) ISP: Airtel f) Model: Huawai router g) Country: India h) Phone number format/s: NA i) I believe the network could be in this format/s: Dont know j) I believe it to be a default password? Yes/No: No Thanks for all your effort!!! Regards [You people rock!!]