NETGEARXX wordlist 1.08

Extremely effective WPA default wordlist

  1. LeichenLiebhaber

    LeichenLiebhaber New Member

    Joined:
    8 Oct 2020
    Messages:
    8
    Likes Received:
    6
    Ja, ich habe es auch herausgefunden, also hat https://www.onlinehashcrack.com/ es für mich getan. Wie haben Sie es herausgefunden? Haben Sie gedacht, Sie würden alle Zahlen von 0 bis 9 und acht Ziffern ausprobieren? Ich brauche 3 Stunden, um alle Kombinationen zu machen. Ich habe gestern auch daran gedacht, es zu versuchen, aber dann dachte ich, Android ap hat standardmäßig Buchstaben und Zahlen, also versuche ich nicht einmal Zahlen. And thx for you help
     
    • Like Like x 1
  2. jada234

    jada234 Active Member

    Joined:
    28 Sep 2020
    Messages:
    3
    Likes Received:
    1
    I need help with this one. Someone up for it ? =)
     

    Attached Files:

    • Like Like x 1
  3. petrovivo1234

    petrovivo1234 Well-Known Member
    VIP

    Joined:
    19 May 2018
    Messages:
    441
    Likes Received:
    519
    10da43df54b6:28ad3efdd5be:NETGEAR97:freeplanet172

    Session..........: hashcat
    Status...........: Cracked
    Hash.Name........: WPA-EAPOL-PBKDF2
    Hash.Target......: NETGEAR97 (AP:10:da:43:df:54:b6 STA:28:ad:3e:fd:d5:be)
    Time.Started.....: Wed Oct 14 10:25:00 2020 (13 secs)
    Time.Estimated...: Wed Oct 14 10:25:13 2020 (0 secs)
     
    • Like Like x 1
    • Agree Agree x 1
    • Friendly Friendly x 1
  4. darkpyrex

    darkpyrex New Member

    Joined:
    21 Oct 2020
    Messages:
    3
    Likes Received:
    3
    Could anyone help me with this one? thank you :)
     

    Attached Files:

    • Like Like x 1
  5. Ntrain2k

    Ntrain2k Well-Known Member

    Joined:
    31 Oct 2012
    Messages:
    110
    Likes Received:
    113
    Hash.Target......: FASTWEB-1-5kZmQmRtu1EW_EXT (AP:a4:2b:8c:04:19:fa STA:6c:ad:f8:b9:80:77)

    Pretty sure they do not follow the standard netgear keyspaces.
     
    • Like Like x 1
    • Informative Informative x 1
  6. darkpyrex

    darkpyrex New Member

    Joined:
    21 Oct 2020
    Messages:
    3
    Likes Received:
    3
    It is a Netgear extender, I think it uses the same dictionary as a Netgear router
     
    • Like Like x 1
  7. Ntrain2k

    Ntrain2k Well-Known Member

    Joined:
    31 Oct 2012
    Messages:
    110
    Likes Received:
    113
    Didn't pop with the regular NG list.
    --- Double Post Merged, 21 Oct 2020, Original Post Date: 21 Oct 2020 ---
    Or the Askey list.
    --- Double Post Merged, 21 Oct 2020 ---
    a42b8c0419fa:6cadf8b98077:FASTWEB-1-5kZmQmRtu1EW_EXT:evolva56
     
    • Like Like x 3
  8. sam smith

    sam smith Well-Known Member

    Joined:
    14 Aug 2013
    Messages:
    47
    Likes Received:
    48
    could someone try his one.
     

    Attached Files:

    • Like Like x 1
  9. Ntrain2k

    Ntrain2k Well-Known Member

    Joined:
    31 Oct 2012
    Messages:
    110
    Likes Received:
    113
    209a7d14c5f6:a47733144b10:SpectrumSetup-F0:easylemon091
    209a7d14c5f6:a47733144b10:SpectrumSetup-F0:easylemon091
     
    • Like Like x 1
  10. justathrowaway989

    justathrowaway989 Well-Known Member

    Joined:
    21 Oct 2020
    Messages:
    6
    Likes Received:
    6
    Could I get a sanity check here? Ran this against the old dictionary then tried piping "hcxpsktool --netgear" and "hcxpsktool --askeyarris" to hashcat. No dice.
     

    Attached Files:

    • Like Like x 1
  11. Ntrain2k

    Ntrain2k Well-Known Member

    Joined:
    31 Oct 2012
    Messages:
    110
    Likes Received:
    113
    5a5b3b871124:1059324180b3:SpectrumSetup-26:unitefamous029
     
    • Like Like x 2
    • Winner Winner x 1
    • Wow Wow x 1
  12. darkpyrex

    darkpyrex New Member

    Joined:
    21 Oct 2020
    Messages:
    3
    Likes Received:
    3
    Thank you mate! I appreciate a lot. What dictionary did you use for pop this one?
     
    • Like Like x 1
  13. Ntrain2k

    Ntrain2k Well-Known Member

    Joined:
    31 Oct 2012
    Messages:
    110
    Likes Received:
    113
    I think it was hashesorg2019?

    Sorry, gone through a hundred or so since then.
     
    • Like Like x 1
  14. justathrowaway989

    justathrowaway989 Well-Known Member

    Joined:
    21 Oct 2020
    Messages:
    6
    Likes Received:
    6
    lol I'm conflicted. It's nice to see its still a vendor password but I'm bummed none of my wordlists had it.
    Did you use a anti-vendor wordlist or a much larger generalist one?
     
    • Like Like x 1
  15. Ntrain2k

    Ntrain2k Well-Known Member

    Joined:
    31 Oct 2012
    Messages:
    110
    Likes Received:
    113
    I've been picking up new words over several of the forums and them adding them to the known list. There is a pretty solid start a couple of pages back.
     
    • Like Like x 1
  16. McCloud

    McCloud Well-Known Member

    Joined:
    25 Aug 2018
    Messages:
    3
    Likes Received:
    3
    Anyone want to give these a shot? I've already tried to crack them and had no luck.
     

    Attached Files:

    • Like Like x 1
  17. petrovivo1234

    petrovivo1234 Well-Known Member
    VIP

    Joined:
    19 May 2018
    Messages:
    441
    Likes Received:
    519
    5ab422ac443f:eaa76279b81d:SpectrumSetup-41:rewardbarrel054
    94917f7b14c1:4c66417f90cf:MySpectrumWiFic3-2G:benchkettle530
     
    • Like Like x 2
  18. McCloud

    McCloud Well-Known Member

    Joined:
    25 Aug 2018
    Messages:
    3
    Likes Received:
    3
    Thanks! I really appreciate it. :happy:
     
    • Like Like x 1
  19. justforfun2020

    justforfun2020 Active Member

    Joined:
    31 Oct 2020
    Messages:
    7
    Likes Received:
    2
    Could someone help me with this one, please?

    The file extension is really .22000 so please rename from .txt after download.

    Have a great weekend :)
     

    Attached Files:

    • Like Like x 1
  20. Spliceguy

    Spliceguy Well-Known Member

    Joined:
    2 Feb 2014
    Messages:
    136
    Likes Received:
    144
    Here you go.

    a75ccede2b64ac9ef0a2612e39922abd:c4041544fb3f:b025aa88b0a8:NETGEAR67:royalstreet853
     
    • Like Like x 2
    • Friendly Friendly x 1

Share This Page

Loading...