SSID: Mavia(friend net) BSSID: 70:4f:57:77:29:68 SSID: PMS NETWORK 1 BSSID: 64:70:02:e8:de:fa Country : Pakstan
Wow, you only take 12 seconds to crack? --- Double Post Merged, 29 Jun 2018, Original Post Date: 29 Jun 2018 --- Can you help me to crack these handshakes? Thanks for your help, my friend Take your time, do not rush.
SSID: Mavia(friend net) BSSID: 70-4F-57-77-29-68 SSID: Zeeshan BSSID: B0-4E-26-13-3F-B0 SSID: LEO NETWOEK farhan BSSID: C8-3A-35-32-44-20 Country : Pakistan --- Double Post Merged, 30 Jun 2018, Original Post Date: 29 Jun 2018 --- Thanks A lot ... can any please go through others
Can Can anyone please find password for me its only one handshake not too many i will be very thankful to you all guys
Please help me with cracking these wifi. SSID: Forthnet-AHvKH BSSID: 98:13:33:41:E1:90 SSID: Stat BSSID: D4:6E:0E:B5:15:06 SSID: Thomson4DC9C4 BSSID: 58:98:35:4D:C9:C4
I just have the PINs SSID: Forthnet-AHvKH - 43175840 SSID: Stat - 18673982 SSID: Thomson4DC9C4 - 50979240
reaver -i wlan0mon -b BSSID -c CHANNEL -p PIN -vv try this out --- Double Post Merged, 1 Jul 2018, Original Post Date: 1 Jul 2018 --- Don't clean caps with wpaclean, they can't be converted to hccapx for hashcat. no timestamps.
That means you need to bruteforce the pin all over again by using reaver reaver -i wlan0 -c CHANNEL -b BSSID -vvv --- Double Post Merged, 2 Jul 2018, Original Post Date: 2 Jul 2018 --- Maybe the wifi network has a different pin