Hi guys please help me with this. ESSID: 26663a BSSID: DC:FE:07:1A:FC:B6 Password should be in 9 numbers format. (123456789) Thanks --- Double Post Merged, 13 Jun 2019, Original Post Date: 13 Jun 2019 --- Password found.
--- Double Post Merged, 18 Jun 2019 --- Can you guys please open up your own Turkish speaking thread ? and stop spamming this english speaking one, very frustrating for us crackers trying to sort out the wheat from the chaff, Thank you for your understanding Have a Nice Day ")
hello guys, on gpuhash.me I found the correct password in 15 minutes, I tried different combinations with bruteforce and dictionaries but I didn't find the password, thanks to those who try to find the correct password. if the cap is not good then I will buy it again as soon as I can message translated with google translator from Italian to English ----------------------------------------- merhaba beyler, gpuhash.me 'de 15 dakika içinde doğru şifreyi buldum, bruteforce ve sözlüklerle farklı kombinasyonlar denedim, fakat doğru şifreyi bulmaya çalışanlar sayesinde şifreyi bulamadım. Eğer kapak iyi değilse en kısa sürede tekrar satın alacağım italyancadan ingilizceye google tercümanı ile çevrilmiş mesaj
root@kali:~# cap2hccapx '/root/Downloads/ntt(2).cap' ntt.hccapx Zero value timestamps detected in file: /root/Downloads/ntt(2).cap. This prevents correct EAPOL-Key timeout calculation. Do not use preprocess the capture file with tools such as wpaclean. post another cap without cleaning it. --- Double Post Merged, 19 Jun 2019, Original Post Date: 19 Jun 2019 --- Your handshakes are no good, get some new ones.
From what country are they from and will they be in English? If they are default passwords (TP-Link) you need to run ?H?H?H?H?H?H?H?H charset on them.
Hi, on gpuhash.me I found the oassword with that cap, in the wireless password recovery program oer windows gives it to me as invalid but I found other passwords of other cap not valid, but then I capture another new cap, between some 12 / 13 days I can recapture it, these days I'm in another house
Well i don't know how gpuhash.me cracked it (unless they used aircrack-ng, which would be highly unlikely) the cap can't be converted to hccapx format ( for use in hashcat)
Can someone help me? Already have tried number like MMDDYY/MMDDYYYY/DDMMYY/DDMMYYYY and basic wordlist no success. Thanks! Code: Select All ESSID..: Desktop_F5015258 MAC_AP.: 62027179bcc6 VENDOR.: unknown PMKID: Code: Select All 85ac5c79a372076349f1e10c243200e1*62027179bcc6*dc7014b942e1*4465736b746f705f4635303135323538
I have tried with rockyou.txt no success too. Code: Select All Session..........: hashcat Status...........: Exhausted Hash.Type........: WPA-PMKID-PBKDF2 Hash.Target......: 85ac5c79a372076349f1e10c243200e1*62027179bcc6*dc701...323538 Time.Started.....: Tue Jun 25 11:37:24 2019 (55 mins, 40 secs) Time.Estimated...: Tue Jun 25 12:33:04 2019 (0 secs) Guess.Base.......: File (rockyou.txt) Guess.Queue......: 1/1 (100.00%) Speed.#1.........: 2878 H/s (2.62ms) @ Accel:16 Loops:8 Thr:64 Vec:1 Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts Progress.........: 14344387/14344387 (100.00%) Rejected.........: 4734914/14344387 (33.01%) Restore.Point....: 14344387/14344387 (100.00%) Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1 Candidates.#1....: !lottie! -> cardtronics Started: Tue Jun 25 11:37:20 2019 Stopped: Tue Jun 25 12:33:05 2019
Hi guys I captured the handshake and gpuhash.me was able to crack it in less than 15 mins using basic dictionary. I tried cracking the same using rockyou.txt from aircrack-ng and still no luck. I would have paid gpuhash but I don't have any Bitcoin or any such accounts. Please help me in cracking this handshake file, I would truly be greatful to you. And yeah, I'll pay small small amount through Amazon pay (because that's the only thing I have). Please understand guys. Thanks
41259009dda2eb32e0d7ca041daf45c2:cc61e588b8ce:c0eefbd76887:lenovo p2:qwerty12543 This is free for ya man, its just a side hobby
man, you are GOD.. you go to heaven --- Double Post Merged, 4 Jul 2019, Original Post Date: 4 Jul 2019 --- i am literally crying. God bless you my man. --- Double Post Merged, 4 Jul 2019 --- By the way how did you do this master? Please teach me, i beg, master. --- Double Post Merged, 4 Jul 2019 --- By the way did you use hashcat with some dictionary along with some rule? Please tell me , even I am interested in penetration testing, I tried only rockyou.txt, and couldn't do the same with best64 rule, since it was very slow. And which dictionary, which rule, or which method? Please teach me too master
These are the flags I use with hashcat, The dictionaries I use is from me collecting and scrubbing them to increase the odds. Just google WPA bruteforce wordlist and download everything you see. Then combine/scrub them to make a master wordlist. Having a GTX 1080TI helps with the speed. If you have any more questions please PM me so we dont spam this thread. Thank you and happy cracking
I got a handshake AP =>: ADSL-1919 and PMKID AP => Orange-F24D : fdb93e4146376d2fd287a49d4cb2d9f5*d0d783f0f24d*7cdd90e83ab4*4f72616e67652d46323444