Thank you for the help. May I know what about the other captures included in the file, were they bad or the key was too complex? How long does it take you to run rockyou.txt and what rig are you currently using? Are we actually able to get md5 hashes from the handshake? If yes, kindly elaborate.
ok,first of all, it takes me one minute to run Rockyou.txt. I am using kali-linux operating system. My rig is a I7-860 quadcore cpu 2.93GHZ , 12GBs of ddr3 ram, nvidia GTX 1060 6GB VRAM graphics card and running Cuda toolkit through hashcat. NO you can not get md5 hashes from a handshake, they are sha1_256bit encyption,know as a slow hash. i was just saying that i wish that they were md5 hashes, because my rig can run md5 hashes at 18 billion passwords a second. and your first question about the other captures in the cap file, because there is 12 in it, it runs pretty slow, about 1.5 hours for a 8 digit attack, so i gave up last night on it, but fear not i am running it again as i type this. --- Double Post Merged, 8 Mar 2018, Original Post Date: 8 Mar 2018 --- here are the results: Session..........: hashcat Status...........: Exhausted Hash.Type........: WPA/WPA2 Hash.Target......: /root/Desktop/caps/wpa.hccapx Time.Started.....: Thu Mar 8 07:41:51 2018 (1 hour, 40 mins) Time.Estimated...: Thu Mar 8 09:21:57 2018 (0 secs) Guess.Mask.......: ?d?d?d?d?d?d?d?d [8] Guess.Queue......: 1/1 (100.00%) Speed.Dev.#1.....: 182.8 kH/s (112.53ms) Recovered........: 2/12 (16.67%) Digests, 1/11 (9.09%) Salts Progress.........: 1100000000/1100000000 (100.00%) Rejected.........: 0/1100000000 (0.00%) Restore.Point....: 10000000/10000000 (100.00%) Candidates.#1....: 92321063 -> 96493939 HWMon.Dev.#1.....: Temp: 82c Fan: 66% Util: 99% Core:1771MHz Mem:3802MHz Bus:16 it only takes 8 - 10 minutes to do a 8 digit attack on 1 good capture, this took 1 hour and 40 minutes, so it looks like i was right to give up on it last night, as i still could only get those 2 keys, which i have already posted.
That's ok mate, sometimes it can be frustrating, as i use kali linux and not xiaopan. there's probably things i can do that you can't. i was just having a crack at wonderwoman.cap (not having much luck) any clues to the possible mask would be nice do you have pyrit on xiaopan? is that what you are running? just analyzed this one and it's not good either. wonderwoman was ok.
I am using Kali Linux not Xiaopan You mean it is a bad handshake? I already capture the handshake twice Any idea how to make the handshake better?
Ah, thank you for the help and I am truly sorry for wasting your time on handshakes that are not as good or as healthy. I was just going about testing out besside-ng but I guess lesson learnt now. I will target them manually and get proper individual handshakes in the future. I wonder how do I tell if its good or healthy? How long will it take if a person were to run Rockyou.txt without a graphics card but on an old dual core desktop for example? (I know, your answer will likely be estimates but Im still rather curious even if its just an estimate. You seem like a really interesting person, so much i could learn from you. May I know what adapters do you own and / or use (it doesnt matter if you want to share a bit more like what you had, what it was great for and which were bad or less decent. By the way, your GPU seems a little hot, everything fine there? --- Double Post Merged, 8 Mar 2018 --- Hi, you might want to try using Kali Linux out here https://www.kali.org/downloads/ Captured handshakes will be on the 1st page loaded by the file manager (which is blue). On how to capture them, try : https://tricksworld99.wordpress.com/2017/06/07/capture-handshake/ Or http://www.kalitutorials.net/2014/06/hack-wpa-2-psk-capturing-handshake.html Make sure to copy them out when you're done or it will be lost if you don't install or have persistence or use it as a live CD or USB. Also note that certain adapters are plug and play while others require installation of drivers (which can be a huge headache if you do not know how to do it) Hope this helps.
The fastest way to collect a handshake (and easiest) using Kali-linux is by using wifite just open a terminal and type wifite. follow directions, but even with that being said, its good to learn to do it manually first. In Kali-linux you open a terminal and use this command: pyrit -r xxxx.cap analyze drag and drop your cap into the terminal from desktop,where it say's xxx.cap this what you want to see. root@owner:~# pyrit -r '/root/Desktop/Longshanks.cap' analyze Pyrit 0.5.1 (C) 2008-2011 Lukas Lueg - 2015 John Mora https://github.com/JPaulMora/Pyrit This code is distributed under the GNU General Public License v3+ Parsing file '/root/Desktop/.Longshanks.cap' (1/1)... Parsed 3 packets (3 802.11-packets), got 1 AP(s) #1: AccessPoint ??:??:??:??:??:?? ('Longshanks_safehouse'): #1: Station ??:??:??:??:??:??, 1 handshake(s): #1: HMAC_SHA1_AES, good, spread 1 if it says bad, spread 1 thats ok it can still be cracked, i just found out. --- Double Post Merged, 9 Mar 2018, Original Post Date: 9 Mar 2018 --- i should really open up my own thread boys, been spamming this one way too much sorry Admin --- Double Post Merged, 9 Mar 2018 --- I don't know the speeds for running Rockyou.txt on a qualcore cpu, i've never run linux on a dualcore. it will depend on your cpu and how much ram you have of course,kali-linux is so resource hungry like a wild beast. my adapter is a tp-link tl-wn722n first edition,second edition doesn't inject or capture packets.(Google it for more info) about my Gpu: yes! she get's hot, good in winter i don't need to turn on the heater but i'm not too worried because she is brand new, if she burn's out i'll make good on the 3 yr warranty we cooked a gpu in the oven for 200c for ten minutes to reflux the circuit board and it worked a mint. so i think she can handle 82c ok, i've had it running on 82c all night, she hasn't given up the ghost yet. and yes, single caps are better , they run faster. don't clean then with wpaclean, i strip them with pyrit myself. then convert them to hccapx file format for hashcat.
yes, i know that,then why have you not been using it, i gave you the terminal command ages ago for testing the caps, and yet you still post these crudy one's! are you with the program yet grasshopper?
you are very welcome kind sir! --- Double Post Merged, 10 Mar 2018, Original Post Date: 10 Mar 2018 --- I tried all of the default masks for Telecentro cap and have had no luck, so it's not one of them. --- Double Post Merged, 10 Mar 2018 --- All of these caps you posted are rubbish --- Double Post Merged, 10 Mar 2018 --- Anak dan Ibu Bapa_D0_5B_A8_AC_61_09.cap: makanbabi
Sorry longshanks I will check it --- Double Post Merged, 10 Mar 2018, Original Post Date: 10 Mar 2018 --- Here is the cap Can you bruteforce it with 8 digits? crunch 01%%%%%%%% Just bruteforce the last 8 digits You can save a lot of time instead of bruteforce 10 digits
Oh dear --- Double Post Merged, 10 Mar 2018, Original Post Date: 10 Mar 2018 --- What does this mean in Pyrit? IOError : libpcap-error while reading : truncated dump file; tried to read 10 captured bytes, only got 7 Does this mean my handshake is bad?
Hi, kindly help me with this cap (hope its good) ESSID.......: Joeyyap BSSID.......: C4:EA:1D:5D:0F:01 Router : Technicolor Thank you. --- Double Post Merged, 10 Mar 2018, Original Post Date: 10 Mar 2018 --- Hi, kindly help me with this cap (hope its good) ESSID.......: Joeyyap BSSID.......: C4:EA:1D:5D:0F:01 Router : Technicolor Thank you.
hey there, feel free to help me 1. ESSID: 642BF5-Maxis Fibre Internet BSSID: 10:13:31:64:2B:F5 2. ESSID: Kien6687 BSSID: 18:A6:F7:C4:7D:1E 3. ESSID: simonst BSSID: A4:B1:E9:B0:4C:99 4. ESSID: Jim caree@unifi BSSID: 7C:8B:CA:7B:5F:FB 5. ESSID: UBNT BSSID: 06:186:99:5C:39 6. ESSID: ong Kim nee BSSID: 30:91:8F:E0:BC:01 7. ESSID: ckleowunifi BSSID: 34:08:04:C7:79:08 Country: Malaysia Thanks!
did you have a good look at my other message about, what you want to see? as far as i know your results do look sad,someone else can correct me if i'm wrong,as i'm still learning myself. try using wifite for capturing handshakes, it's real easy. just type wifite into your terminal, play around with it and watch what it can do. --- Double Post Merged, 10 Mar 2018 --- hey mate, you still havn't given me the results of the last two passwords i cracked for you, did they both work?
Omg. I forget bout that. The first one i didnt know which area is the house. Haha but the second one is working but the signal is 20%. Haha but still its working.
are these for your phone bro? --- Double Post Merged, 10 Mar 2018, Original Post Date: 10 Mar 2018 --- do you collect them from laptop? i'm working on them as we speak.