so kgb hash killa devision zen com rad/// --- Double Post Merged, 29 Jul 2019, Original Post Date: 29 Jul 2019 --- Top 2 billion(21.7 gb) and anti public(1.9 gb) wordlists. got links to those did you try it with base rule 64 in hash cat ?i think we all should share hashpot files and john has pot founds we all need new better words list... these old school methods are rehashing the same stuff ..
Hi Can someone help crack those PMKIDS : cf4c92f18e1a74bb1475e652b883b1fe*a4933fbb7304*00ec0a44597e*626f78696e7769 ==> ESSID = boxinwi c857aed96ff4d703422a867b59d3eea9*cc2d215ca1e1*f0a225f8981f*207769666931 8ba12169814cf99fbf0d26f5cb2a442b*cc2d215ca1e1*5c2e5917f6f1*207769666931 thank you
Hello guys, I am having trouble cracking this handshake. I've been trying for a week, but no success. I tried rockyou, 0-8 digit dictionary, and a couple of dictionaries from weakpass, but no success at all! I don't know if I'm doing something wrong.
I downloaded older version of hashcat and this time i was able to crack it with the same 8 digit 0-8 dictionary. I guess the latest version has some issues with the amd drivers.
Good to see you got it sorted mate Yeah i thought something was amiss, because you should've cracked it . but you don't really need that dic (0-9) you just set your own charset. -a 3 ?d?d?d?d?d?d?d?d
Can anyone help with one handshake? Thanks --- Double Post Merged, 17 Aug 2019, Original Post Date: 16 Aug 2019 ---
root@kali:~# cap2hccapx '/root/Downloads/Orange-F24D.cap' Orange-F24D.hccapx Zero value timestamps detected in file: /root/Downloads/Orange-F24D.cap. This prevents correct EAPOL-Key timeout calculation. Do not use preprocess the capture file with tools such as wpaclean.
I know a lot of time has elapsed, but I have just joined this forum. The password is: rh0dqx3d A reverse engineering of this router, including a default password generator and a default password dictionary generator, is available at this url: https://github.com/digiampietro/hacking-gemtek