WPA / WPA2 Auditing Service

Discussion in 'Community Services' started by Mr. Penguin, 11 Apr 2013.

  1. gearjunkie

    gearjunkie Well-Known Member
    VIP

    Joined:
    28 Aug 2014
    Messages:
    454
    Likes Received:
    481
    Sorry, I have tried it with the extended adjective-noun list and still nothing. It has also been tested it against 8 digits, 9 digits, and my word lists just to make sure the password is not something simple.
    --- Double Post Merged, 13 Mar 2016, Original Post Date: 13 Mar 2016 ---
    This is a better handshake capture although it does not have the same SSID as the first one. The result is below:

    EE-ftn95a:5cdc96f1697d:80be056b9076:wrist-map-past
    --- Double Post Merged, 14 Mar 2016 ---
    Sorry, I have tested both captures against 8 and 9 digits, Malaysia phone numbers, and my word lists without any luck.
     
    • Like Like x 1
    • Winner Winner x 1
  2. bob79

    bob79 Well-Known Member

    Joined:
    21 Jan 2016
    Messages:
    14
    Likes Received:
    9
     
    • Funny Funny x 1
  3. gearjunkie

    gearjunkie Well-Known Member
    VIP

    Joined:
    28 Aug 2014
    Messages:
    454
    Likes Received:
    481
    It is possible that your capture is bad. I cannot verify because it only has two out of the four eapol packets.
     
    • Like Like x 1
  4. bob79

    bob79 Well-Known Member

    Joined:
    21 Jan 2016
    Messages:
    14
    Likes Received:
    9
    if it's in the adjective-noun list it will find it even with only two eapol.about the other tries.. i have to find some time first. thank you again
     
    • Like Like x 1
  5. gearjunkie

    gearjunkie Well-Known Member
    VIP

    Joined:
    28 Aug 2014
    Messages:
    454
    Likes Received:
    481
    I am saying that there is a possibility the eapol packets are corrupted or not in sequence (eapol packet 1 and packet 2 are not from the same authentication sequence). It is not possible to verify the packets when there are only two eapol in the capture, unless you already know the password.
     
    • Like Like x 1
  6. bob79

    bob79 Well-Known Member

    Joined:
    21 Jan 2016
    Messages:
    14
    Likes Received:
    9
    always used this type of hanshake. as long as pyrit starts, should be ok.cracked 2 netgears with 2 packets only. unfortunatelly i only have cpu, so for the 3 Gb of netgearxx passwd list, took me bout 4 hours to pass through. the other netgears took about 20 mins or so to find the right one.thank you for your time though
     
    • Like Like x 1
  7. dunnoster

    dunnoster Member

    Joined:
    11 Mar 2016
    Messages:
    3
    Likes Received:
    3
    Need some help from you all here if you can discover the pass..

    a) I have attempted to crack the network/s using the following methods: reaver. .nope. wps locked
    d) Network Name: lohsh
    e) ISP: Maxis Malaysia
    f) Model: Technicolor something..
    g) Country: Malaysia
    h) Phone number format/s: could be 10 or 8 digits..
    j) I believe it to be a default password? Yes/No: Probably

    a) I have attempted to crack the network/s using the following methods: reaver. .nope. wps locked
    d) Network Name: benny
    e) ISP: Maxis Malaysia
    f) Model: Technicolor something..
    g) Country: Malaysia
    h) Phone number format/s: could be 10 or 8 digits..
    j) I believe it to be a default password? Yes/No: Probably
     

    Attached Files:

    • Like Like x 1
  8. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    Regarding the lohsh cap, I tried 8,9, and 10 digits. No luck. If i am not mistaken, Technicolor (Thompson) have a keyspace of 10 upperhex
    --- Double Post Merged, 18 Mar 2016, Original Post Date: 17 Mar 2016 ---
    Here you go, had to try multiple dictionaries after 8,9,and 10 digit attack failed. Wished I used my own wordlist from the beginning. Oh well !

    Dlink:84c9b2c0062c:dccebc834bac:ABCD123456

    Session.Name...: oclHashcat
    Status.........: Cracked
    Input.Mode.....: File (..\files\PhoenixCoder-WPA) [10]
    Hash.Target....: Dlink (84:c9:b2:c0:06:2c <-> dc:ce:bc:83:4b:ac)
    Hash.Type......: WPA/WPA2
    Time.Started...: 59 secs
    Speed.GPU.#*...: 783.43 kH/s
    Recovered......: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts
    Progress.......: 49845492576/216719532941 (23.00%)
    Rejected.......: 0/1 (0.00%)
    HWMon.GPU.#1...: 100% Util, 66c Temp, N/A Fan
    HWMon.GPU.#2...: 88% Util, 66c Temp, N/A Fan

    Hope you found the WPA key useful
     
    #1348 PhoenixCoder, 18 Mar 2016
    Last edited: 18 Mar 2016
    • Like Like x 1
  9. dunnoster

    dunnoster Member

    Joined:
    11 Mar 2016
    Messages:
    3
    Likes Received:
    3
    Thanks for trying :(
     
    • Like Like x 1
  10. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    Why the sad face? The password has been found, it is one in red "ABCD123456"
     
    • Agree Agree x 1
  11. bob79

    bob79 Well-Known Member

    Joined:
    21 Jan 2016
    Messages:
    14
    Likes Received:
    9
    hahaha he didn't read all sentences :))
     
    • Like Like x 1
  12. Hello everyone!!

    a) I have attempted to crack the network/s using the following methods: default password, mutating default passwords, common passwords that lazy people keep :D (I dont have a gpu so I cant run EWSA)
    b) I have tried the following password/s formats:
    c) Mac Address: fc:dd:55:09:9c:75
    d) Network Name: MBLAZE-DF800i-9C75
    e) ISP: MTS Mblaze
    f) Model: Shenzen dongle I believe
    g) Country: India
    h) Phone number format/s: NA
    i) I believe the network could be in this format/s: Not sure about it sorry
    j) I believe it to be a default password? Yes/No: No

    Thanks for all your effort!!!
    Regards
     

    Attached Files:

    • 2.CAP
      File size:
      1.2 MB
      Views:
      4
    • Like Like x 1
  13. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    Using cap2hccap shows this error:
    [error ] unable to find valid handshakes.


    Running pyrit to analyze the cap file shows 5 access points:

    #1: AccessPoint 0c:d2:b5:3f:5a:8c ('None'):
    #2: AccessPoint be:30:7d:23:35:9c ('DIRECT-31-VIErA_thas610d'):
    #3: AccessPoint 30:b5:c2:bc:1d:1c ('House Stark>>!!'):
    #4: AccessPoint fc:dd:55:09:9c:75 ('MBLAZE-DF800i-9C75'): (284 handshake(s) with 144 marked as bad)
    #5: AccessPoint 54:b8:0a:52:c1:75 ('PCRA-ER,KOL'):

    I used aircrack to extract just the MBLAZE capture and create the hccap file but doubt it would be clean enough to effectively test. I would suggest collecting a cleaner capture for that network.
     
    • Like Like x 2
  14. Thanks for the reply. Let me know in case it works out or not...otherwise ill get hold of a better CAP.
    Regards
     
    • Like Like x 1
  15. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    Well there is no concrete way of knowing if it is a good or bad capture unless you already have the correct password but am running my usual list of attacks against it
     
    • Like Like x 1
  16. dunnoster

    dunnoster Member

    Joined:
    11 Mar 2016
    Messages:
    3
    Likes Received:
    3
    eh? I thought that one was for the one for Janice Lim.. not mine.
     
    • Like Like x 1
  17. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    Oh you're right, Janice Lim's was cracked. In any case, technicolor being 10 hex will take a significant amount of time but we may get lucky
     
    • Like Like x 1
  18. mampwamp

    mampwamp Active Member

    Joined:
    18 Aug 2013
    Messages:
    43
    Likes Received:
    12


    Unifi, Malaysia.

    Please help me to crack the wifi. Thanks.:shame:
     

    Attached Files:

    • Like Like x 1
  19. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    May I remind you that if you would like your request to be taken seriously, it is recommended to abide by rule 2

    As just throwing a cap file shows laziness and doesn't motivate people to put in the effort to crack it.
     
    • Agree Agree x 1
  20. Hello everyone!!

    a) This network pops up at times for a few hours and I finally managed to capture a handshake decently.I tried using the common password (since its the default SSID), the SSID name itself and in mutated forms but no luck.
    b) I have tried the following password/s formats: password, admin, 123, airtel, and permuted/combined forms
    c) Mac Address: 24:1f:a0:c4:98:0d
    d) Network Name: Airtel-E5573-980D
    e) ISP: Airtel
    f) Model: Huawai router
    g) Country: India
    h) Phone number format/s: NA
    i) I believe the network could be in this format/s: Dont know
    j) I believe it to be a default password? Yes/No: No

    Thanks for all your effort!!!
    Regards [You people rock!!]
     

    Attached Files:

    • 1.CAP
      File size:
      919.6 KB
      Views:
      4
    • Like Like x 1

Share This Page

Loading...