can someone take a look at this PMKID and Handshake (from the same AP) 7cf9e902157eca037c4c528f6e4b3f69*d46e0e8bc6da*f0a225ab1817*54502d4c494e4b5f4336 thanks
I tried BIG-WPA-LIST-1 ,BIG-WPA-LIST-2 and BIG-WPA-LIST-3 wordlist but can't find the password. Some friends say Malaysia wifi is using numeric. So what should I do? Find numeric wordlist online?
SSID set: BongFoongMoi@unifi The default SSID has been changed, so there is a 99% chance the password has also been changed. I dont know where you obtained the handshake from, but I'd suggest a straight dictionary attack on the language in your country as well as anything relating to whatever "BongFoongMoi" is. I tried both keyspaces shown below: * TP-LINK_#### - [0-9] - Len: 8 - `?d?d?d?d?d?d?d?d` * TP-LINK_###### - [0-9A-F] - Len: 8 - `?H?H?H?H?H?H?H?H` Both were exhausted. Sorry I couldn't be of more help.
I believe so. After researching, TP-Link_C6 I dont believe is factory. The only factory SSID I saw were TP-Link_(4digit/letter) ex. TP-Link_4B9F
Anyone able to crack this one? SSID: MySpectrumWiFi0b-2G BSSID: 78:29:ED:FF:11:09 Manufacturer : Askey Module : RAC2V1K Country : USA
I live in down town Huntington Beach also, failed to find this Askey router password, failed on a couple other of these types before...carnivore1 --- Double Post Merged, 16 Dec 2018, Original Post Date: 16 Dec 2018 --- Is it Comcast or Frontier ISP?
thanks carnivore1 --- Double Post Merged, 16 Dec 2018, Original Post Date: 16 Dec 2018 --- It's Spectrum
Oh, thats the old Time Warner, usually they are netgear wordlist possibilities, but recently (last 3 I have run)...all have been changed or have Askety long numerical or mixed numerical + upper case passwords...carnivore1
My old enemy network is finally gone, this has taken its place , ISP Frontier, essid Fios-HNAH6, PMKID file is 554a87e2676653823892011ff82dd149*d4a9281bfb16*f0a22538f653*46694f532d484e414836 Now the I need help part, was already running a 8?H attack and computer just shut off, when restarting hashcat has message(see attachment)..how do i remove pid file?, where do i find pid?, no hashcat folder in kali root for me?? thanks carnivore1 I should add I have tried rebooting system and all other common sense procedures.
Its /root/.hashcat/... meaning it's a hidden folder. Go to the root directory in file explorer and in the top right in the menu, click "show hidden folders"
For those of you posting default SSID .cap's, check out this keyspace guide to help out with your cracking: https://hashcat.net/forum/thread-6170.html Hope this helps someone.
Hello everyone I've tried to capture every 4-way Handshake or PMKID possible in one capture file with this command : hcxdumptool -i wlan0mon --enable_status=3 -o gotchu.cap and its end up with one handshake and 2 PMKIDs so i want to know if we can crack every AP in that cap file in the same time with hashcat or no. btw this is the command to extract the PMKIDs from the cap file : hcxpcaptool -z <output file> <capture file> thanks
Absolutely. If you have multiple PMKID's (-m16800) put them in a txt file, 1 per line. Then where you would normally put the one PMKID, put the path to the txt file. If you have multiple .cap files, do cap2hccapx with hashcat-utils, then "cat <.cap file 1> <.cap file 2> <.cap file 3> > <path to .hccapx>. That will give you .cap 1, 2, and 3 in one .hccapx file. Then you can run -m 2500 with that one hccapx file and under the "Recovered" section you should see 0/3 or however many you have. --- Double Post Merged, 18 Dec 2018, Original Post Date: 18 Dec 2018 --- Also, the gotcha.cap file you posted does not contain a valid handshake.
Thank you Oh , Im sorry but when i run that command , i saw [Found Handshake], maybe cap2hccap can't recognize hcxpumptool captures file
I think is 9 digts of numbers. I haven't use hashcat before. What I use is aircrack-ng. I tried to install hascat, but can't install using make/ make install/ sudo make install. Do you know what the problem is?