Thank you. Maybe better luck with this ? ESSID.......: Forthnet-B20A45 BSSID.......: 0C:80:63:95:51:5F Manufacturer : Tp-Link
@Cendol - that cap is no good, the time stamp between m1 and m2 is too long. and i know you will say that aircrack-ng says its ok, but it can't be converted to hccapx because of that fact.
I guess nobody found it. Can try that too? ESSID: sirin BISSID: A0:E4:CB:15:FA:63 (Zyxel Communications Corporation)
Try with ( https://github.com/v1s1t0r1sh3r3/airgeddon ).Use NULL PIN. It's working for most ZTE adsl modems /Vodafone, Forthnet etc./
Yes , I know about that. I tried but didn't work. By the way , do you know any working method for wps hacking for cosmote (speedport entry 2i routers)?
WPS on COSMOTE /Speedport entry 2i, Huawei/ is disable. They are very hard for hacking. Speedport entry 2i is using 16 digits (A-Z)(a-z)(0-1). Huawei - 12 digits (A-Z)(a-z).
@ longsharks Can you please tell me what wordlist you are using ? (C.txt, D-1.txt ....etc) Is it your custom-list ? Happy New Year !!!
Thanks for the reply ! Can you recommend small wordlist where I can apply some rules ? ( I am a poor guy, and my hardwares are very limited ) I tried some obvious sources like hashes.org, weakpaas.com, hashkiller-dic, but I am not getting much success. I know there isn't a perfect wordlist, but it looks like you are getting awesome results. I want to learn Can you help me a noob a bit ? I appreciate any input. Thanks !
@Mugenma - Research all threads- there is a wealth of knowledge out there- put the time in. It takes years of trial and error, to get the gold. Don't expect to learn in 5 minutes. seek and ye will find ! I'll drop this gem for you tho' : DEFAULT PASSWORD CHARSETS 2WIREXXX - [0-9] Length 10 (Common AT&T DSL routers in the USA.) 3Wireless Modem XXXX - [0-9A-F] (first 4 digits of ESSID then 4 x [0-9A-F]) Length 8 ATT?d?d?d - [0-9] Length 10 belkin.xxx - [2-9a-f] length 8 Belkin.XXXX - [0-9a-f] Length 8 belkin.XXXX - [2-9a-f] length 8 Belkin_XXXXXX - [0-9A-F] Length 8 BrightBox - 3 Words separated by "-" Example dizzy-tool-cat Lengths 3-4-5 or any combination. BTHomeHub1XXXX - [0-9a-f] (Broken algorithm) Length 10 BTHomeHub2XXXX - [2-9a-f] (0 and 1 omitted) Length 10 BTHub3 - [2-9a-f] (0 and 1 omitted) Length 10 BTHub4 - [2-9a-f] (0 and 1 omitted) Length 10 CenturyLinkXXXX - [0-9a-f] Length 14 DJAWEB_xxxxx - [0-9] Length 10 Domino-XXXX - [0-9A-F] Length 8 E583x-xxxx - [0-9] Length 8 E583x-xxxxx - [0-9A-F] Length 8 EasyBox-xxxxxx - [0-9A-F] Length 9 EE-BrightBox - 3 Words separated by "-" Example dizzy-tool-cat Lengths 3-4-5 or any combination. FRITZ!Box Fon WLAN xxxx - [0-9] Length 16 Iphone 5 lower alpha + 4 numbers Example hello1234 Keenetic-XXXX - [a-zA-Z0-9] Length 8 Livebox-XXXX - Impossible mifi2 - [A-Z0-9] Length 13 MobileWifi-xxxx - [0-9] Length 8 NETGEARXX - Adjective + Noun + 3 Digits SSID: NETGEAR37 KEY: vastcoconut260 ONOXXXX - [0-9] Length 10 Orange - ?d?l?d?l?l?d - [0-9a-f] Length 8 Orange - ?u?u?d?u?d?d - [0-9A-F] Length 12 Orange-XXXX - [2345679ACEF] Length 8 Plusnet Broadband UK - [a-zA-Z0-9] Length 64 PlusnetWireless-XXXXXX - [0-9A-F] Length 10 SKYXXXXX - [A-Z] Length 8 SpeedTouchXXXXXX - [0-9a-f] Length 10 (Broken algorithm) SSID: NETGEAR37 KEY: Adjective + Noun + 3 Digits Example vastcoconut260 TALKTALK-XXXXXX - [ABCDEFGHJKMNPQRTUVWXY346789] (ILOSZ0125 omitted) Length 8 Technicolor-Router [0-9A-F] Length 10 Thomson - [0-9A-F] Length 10 ThomsonXXXXXX - [0-9a-f] Length 10 TNCAP-XXXX [0-9A-F] Length 10 TNCAPXXXXXX - [0-9A-F] Length 10 TP-LINK_xxxxxx - [0-9A-F] Length 8 UNITE-XXXX - [0-9] Length 8 UPCXXXXXXX - [A-Z] Length 8 Verizon MIFIXXXX XXXX - [0-9] Length 11 Virgin Media - [abcdefghjklmnpqrstuvwxyz] (0 and i omitted) Length 8 Virgin Mobile - MiFiXXXX XXX - [0-9] Length 11 VMXXXXXXX 2G - [abcdefghjklmnpqrstuvwxyz] (0 and i omitted) Length 8 VMXXXXXXX 5G - [abcdefghjklmnpqrstuvwxyz] (0 and i omitted) Length 8 ZyXELXXXXXX - [0-9A-Z] Length 13 As for wordlists you can create your own with this: https://github.com/landgrey/pydictor The best rule set out there is: https://www.notsosecure.com/one-rule-to-rule-them-all/ https://github.com/NotSoSecure/password_cracking_rules