Ok thanks for the update. If you have any luck with the SSID - suhash * WiFi * let me know Thanks anyway
It was not in the NETGEAR dictionary, it was a 10 digit password as seen below NETGEAR61: 6263765629 Hope that helps you. --- Double Post Merged, 3 Jun 2016, Original Post Date: 3 Jun 2016 --- Have a cluster server made up of several desktops with a total of 4 graphics cards that totals a WPA cracking speed of around a million passwords per second (1000 KH/s). Here is how long each one took in minutes: [xtable=cellpadding:0|cellspacing:0|433x@] {tbody} {tr=@x11} {td=top|154x11} Keyspace Name{/td} {td=top|144x11} Keyspace Size{/td} {td=top|135x11} Time in Minutes{/td} {/tr} {tr=@x21} {td=top|154x21} 8 HEX Uppercase{/td} {td=top|144x21} 4294967296{/td} {td=top|135x21} 71.58{/td} {/tr} {tr=@x21} {td=top|154x21} 8 HEX Lowercase{/td} {td=top|144x21} 4294967296{/td} {td=top|135x21} 71.58{/td} {/tr} {tr=@x21} {td=top|154x21} 8 Digit Attack{/td} {td=top|144x21} 100000000{/td} {td=top|135x21} 1.67{/td} {/tr} {tr=@x21} {td=top|154x21} 9 Digit Attack{/td} {td=top|144x21} 1000000000{/td} {td=top|135x21} 16.67{/td} {/tr} {tr=@x21} {td=top|154x21} 10 Digit Attack{/td} {td=top|144x21} 10000000000{/td} {td=top|135x21} 166.67{/td} {/tr} {tr=@x21} {td=top|154x21} adjective_noun_3d{/td} {td=top|144x21} 20808000{/td} {td=top|135x21} 0.35{/td} {/tr} {tr=@x21} {td=top|154x21} adjective_noun_1d{/td} {td=top|144x21} 208080{/td} {td=top|135x21} 0.00{/td} {/tr} {tr=@x21} {td=top|154x21} Super-WPAv2{/td} {td=top|144x21} 2161953941{/td} {td=top|135x21} 36.03{/td} {/tr} {tr=@x21} {td=top|154x21} Distributed.WPA{/td} {td=top|144x21} 262372509{/td} {td=top|135x21} 4.37{/td} {/tr} {tr=@x21} {td=top|154x21} SkullSecurity{/td} {td=top|144x21} 57042303{/td} {td=top|135x21} 0.95{/td} {/tr} {tr=@x21} {td=top|154x21} rockyou{/td} {td=top|144x21} 14343296{/td} {td=top|135x21} 0.24{/td} {/tr} {tr=@x21} {td=top|154x21} BIG-WPA-ALL{/td} {td=top|144x21} 304633555{/td} {td=top|135x21} 5.08{/td} {/tr} {tr=@x21} {td=top|154x21} 18_in_1{/td} {td=top|144x21} 1130347502{/td} {td=top|135x21} 18.84{/td} {/tr} {tr=@x21} {td=top|154x21} {/td} {td=top|144x21} {/td} {td=top|135x21} {/td} {/tr} {tr=@x21} {td=top|154x21} TOTAL{/td} {td=top|144x21} {/td} {td=top|135x21} 394.03{/td} {/tr} {/tbody} [/xtable] So in total 394 minutes i.e. roughly 6.5 hours.
Can someone help me this. a) I have attempted the network/s using reaver. Already tried it for 5 hours but couldnt get the password. b) I have no dictionary, only depending on the wps attack. c) Mac Address: D0:3E:5C:3E:FD:FC d) Network Name (ESSID): tahir e) Model: HUAWEI f) Country: Pakistan g) I don't believe it to be a default password. Thanks.
boss!! you are a good help thank you so much. but unfortunately, the user has changed the password before i tried to use it. how unlucky i was, maybe they detected that their modem are being :censored** up by the wps reaver attack and linset so they were alarmed because of it. if you could help me again crack these WPA's for me, i would really appreciate it brother. for home.cap a) I have attempted to crack the network/s using reaver but its not vulnerable, no wps available. tried rockyou.txt not found b) I have tried the following password/s formats: i have no other dictionary only depending on the wps attack and rockyou d) Network Name: Home Broadband c) mac address: 58:98:35:66:93:9B e) ISP: STC i think (not sure) f) Model: according to my wps cracker its technicolor g) Country: SAUDI ARABIA j) I believe it to be a default password? Yes, beacuse the network name has not changed yet. Hoperfully for dlink.cap a) I have attempted to crack the network/s using reaver but its not vulnerable, no wps available. tried rockyou.txt not found b) I have tried the following password/s formats: i have no other dictionary only depending on the wps attack and rockyou d) Network Name: dlink-F034 c) mac address: c8:BE:19:74:F0:34 e) ISP: (not sure) f) Model: according to linset it is DIR-505 g) Country: SAUDI ARABIA j) I believe it to be a default password? Yes, and the format is, 5lowercase and 5 digits ex. akbdj19638 ihope you might help me with these boss.
@PhoenixCoder I believe the suhash * WiFi * network password is a combination made of the digits - 0,1,2,3,4,5,6,7,8,9 in a 8 digit format with repeatitions allowed - like a WPS key - that is it is the default password. Please continue the attack with this idea. Thanks
a) I have attempted the network/s using reaver. Already tried it for 47 hours but couldnt get the password. b) I have no dictionary,wps attack is closed. c) Mac Address: 5C-F4-AB-49-59-E2 d) Network Name (ESSID): TTNET_ZyXEL_U9A3 e) Model: ZyXEL VMG3312-B10B f) Country: Turkey g) I don't believe it to be a default password. --- Double Post Merged, 11 Jun 2016, Original Post Date: 10 Jun 2016 --- Please! Help me cracked....
Tried a few dictionaries, 8 digit, 9 digit, and 01 followed by 8 digits but no luck. Now trying 10 digit followed by more dictionaries but am not optimistic
Model: Netgear VEGN2610 Mac: 80:37:73:C7:9A:3F SSid : FoxtelHub9A3F ----- Model: Netgear EVG2000 Mac: e0:46:9a:63:a8:86 SSid: BigPond048C ----- Model: Netgear CG3100D Mac:6c:b0:ce:80:99:b0 SSid: pretty fly for a wifi Thanks in Advance --- Double Post Merged, 12 Jun 2016, Original Post Date: 12 Jun 2016 --- Beeen Cracked .. Thank You Model: Netgear EVG2000 Mac: e0:46:9a:63:a8:86 SSid: BigPond048C
Hello, I need your help to get the password of those router Thank you in advance and sorry if i disturb you Routers info : a) I already tried to crack those routers for 3 days but no luck (Pixiedust method to get WPS PIN). b) I have no dictionary, i tried only WPS attack. Router 1 c) MAC Address : 30:91:8F:BF:34:C1 d) Network Name : TNCAPBF34C1 e) ISP : Maroc Telecom f) Model : Technicolor Router 2 c) MAC Address : A4:B1:E9:BD:98:15 d) Network Name : TNCAPBD9815 e) ISP : Maroc Telecom f) Model : Technicolor Router 3 c) MAC Address : 30:91:8F:C4:6E:2B d) Network Name : DELTA01 (The network name is changed ... the default name i think is : TNCAPC46E2B) e) ISP : Maroc Telecom f) Model : Technicolor Router 4 c) MAC Address : 82:BA:EE:FB:FE:3F d) Network Name : TNCAP1613B8 e) ISP : Maroc Telecom f) Model : Technicolor g) Country: Morocco
does anyone know if its possible to get the password from networks that has this type of password >> ujzwzyvys8Kx and where i can get the dictionary file. thanks in advance !
can someone help me crack this i have tried the netgearxx dictionary ESSID: NETGEAR50 BSSID: 6C:B0:CE:F2:B2:C4
Hello, can you help me with these two?. I try to run the dictionary but my old samsungN150 cant even read the text fluidly. Thanx a lot. SSID: Telecentro-0f90 Vendor: Telecentro MAC Address: 8C:10:d4:89:0F:96 Router: Sagemcom Broadband SAS Country: Argentina (Spanish Language) Default Key Format: tele-xxxxxxx (numerical 7 digits) Another probably Default Key Format (newest) : xxxxxxxx (numerical 8 digits ) from 20000000 to 45000000 Phone number format/s: 11xxxx-xxxx or 5411xxxx-xxxx SSID: Telecentro-Beta Vendor: Telecentro MAC Address: 48:5B:39:72:88:1C Router: ASUSTek COMPUTER Inc. Country: Argentina (Spanish Language) Default Key Format: tele-xxxxxxx (numerical 7 digits) Another probably Default Key Format: xxxxxxxx (numerical 8 digits ) from 20000000 to 45000000 Phone number format/s: 11xxxx-xxxx or 5411xxxx-xxxx Thanks.
[BCOLOR=#ff0000]Read The Rules[/BCOLOR] 4) Make it Easy c) Ensure that a handshake was captured (in your case the cap is corrupted) e) Do not continually ask for your cap/s to be cracked. Once is enough.