@longshanks can you help me to get password --- Double Post Merged, 10 Sep 2019, Original Post Date: 10 Sep 2019 --- @longshanks that´s a new file --- Double Post Merged, 10 Sep 2019 --- new
Pass found at gpuhash.me Type: WPA/WPA2 EAPOL ESSID: NTGR_8DF5 BSSID: 10A:43:59:8D:F5 (Netgear) STMAC: 6C:4D:73:98:60:43 (Apple, Inc.) MIC: F9895ACD3188359D4BF7E4675A104FA5 Basic search Unfortunatelly my PC is dead now, so i can't bite it C'mon, guys :*
Awww... Thanks a lot, mate! Kisses! P.S. I've got harder bites at home Not for now. Catch You later! --- Double Post Merged, 11 Sep 2019, Original Post Date: 11 Sep 2019 --- Oh, i forget i've got forbidden another one, but it's poor... gpuhash displayed this: Best handshake selected: ESSID.......: WLAN1-EYY53L BSSID.......: 30:A1:FA:9B:36:37 (Huawei Technologies Co.,Ltd) STMAC.......: 00:1A:73:C7:E3:78 (Gemtek Technology Co., Ltd.) Handshakes..: 1 Quality: 0% (very poor) WARNING! Your best handshake is workable but has very poor quality. It will be better to capture another one. WLAN1-EYY53L (30:A1:FA:9B:36:37 <-> 00:1A:73:C7:E3:78) 9C65173CEED48B902C5E7469C34F1DD2 HMAC_SHA1_AES M1+M2/M2, 707, 3550.9ms, 0/0, !auth, 0% ...and seems that i've already tried to put it into gpuhash, but i can't remember that! Can anything be done about it? Or should I catch a better handshake? Help me guys, please
working on them @666thAngel root@kali:~# aircrack-ng '/root/Downloads/666.pcap' Opening /root/Downloads/666.pcap Read 3 packets. # BSSID ESSID Encryption 1 30:A1:FA:9B:36:37 WLAN1-EYY53L WPA (1 handshake) Choosing first network as target. Opening /root/Downloads/666.pcap Read 3 packets. 1 potential targets Please specify a dictionary (option -w). root@kali:~# cowpatty -r '/root/Downloads/666.pcap' -s 666 -c cowpatty 4.8 - WPA-PSK dictionary attack. <[email protected]> Collected all necessary data to mount crack against WPA2/PSK passphrase. root@kali:~# cap2hccapx '/root/Downloads/666.pcap' 666.hccapx Networks detected: 1 [*] BSSID=30:a1:fa:9b:36:37 ESSID=WLAN1-EYY53L (Length: 12) Written 0 WPA Handshakes to: 666.hccapx It looked all good until i tried to convert it to hccapx for hashcat. looking at in in wireshark - there is too long of a time delay between m1 and m2. --- Double Post Merged, 11 Sep 2019, Original Post Date: 11 Sep 2019 --- Get a new one
Type: WPA/WPA2 EAPOL ESSID: HUAWEI-B311-A35A BSSID: EC:56:23:04:A3:5A (Huawei Technologies Co.,Ltd) STMAC: C0:8C:71:46:00:86 (Motorola Mobility LLC, a Lenovo Company) MIC: 2E2FD032C84FBC31FB42A34A8AC7B899 Not found in gpuhash, basic search. WPS unavailable Nah!
Hi, can You guys try this birthday one, please? Gpuhash didn't crack this... Your capture statistics: Access Points found: 1 Handshakes found: 2 Best handshake selected: ESSID.......: ZyXELCA74A6 BSSID.......: 5C:E2:8C:CA:74:A7 (Zyxel Communications Corporation) STMAC.......: E4:F8:9C:31:BD:CA (Intel Corporate) Handshakes..: 2 Quality: 100% (excellent) ZyXELCA74A6 (5C:E2:8C:CA:74:A7 <-> E4:F8:9C:31:BD:CA) 4B99043E886AE20EDFF8765352CF8E1C HMAC_SHA1_AES M1+M2/M2, 11, 88.6ms, 0/0, !auth, 42% 4B99043E886AE20EDFF8765352CF8E1C HMAC_SHA1_AES M2+M3/M2, 2, 16.4ms, 0/1, auth, 100%
;-) any one want to see if they can crack these for me friends ? thanks kinda curios to see if they are solvable still in recovery mode hope your all well.. let me no if you find these thanks
#2564 ghostman, 19 Jul 2019 You have already posted these before What is this? Target one network and one station. what is so hard about that, nah you guys try to get a handshake with a bloody scatter gun. --- Double Post Merged, 13 Sep 2019, Original Post Date: 13 Sep 2019 --- Yeah well, the default passwords for ZyXELXXXXXX [10:0-9 A-F][13:0-9 A-Z] Len: 10 or 13
@longshanks It's not for my poor laptop now Tell me please, how long would it take to break its PMKID hash? bbc160c18061429aad69af97700298ac Maybe I'll try to do it on my friend's PC... (my machine is still dead as hell) ...but i need to learn something about it
They take about the same time as a hccapx I'll run it through my passwordlists , just in case they changed it from default. --- Double Post Merged, 13 Sep 2019, Original Post Date: 13 Sep 2019 --- @666thAngel I hear that the wps pins are easy to crack on those Zyxel modems. Try reaver or bully on it.
I wonder what delay (-d) to set so that it does not block ... AP blocks for more than 24 hours in this case