Can you help me out with these two? The wifi140 one can be between 10 and 12 numbers by default. The other one I tried rockyou and some spanish dicts to no avail.
10x d = 7 hours. --- Double Post Merged, 9 Dec 2020, Original Post Date: 8 Dec 2020 --- Zero value timestamps detected in file: /root/Downloads/Inca.cap. This prevents correct EAPOL-Key timeout calculation. Do not use preprocess the capture file with tools such as wpaclean
Hi, can help with the 2 handshake? Have tried with a few dictionaries and with rules 64, unable to get a result. Thank you in advance Country of origin: Malaysia
Hello,can you help me out with these two? I tried those 2 with simple, WPA-Probable, CAIN Dictionary no luck. Location Indonesia. ESSID.......: Altair BSSID.......: 14:4D:67:CE:58:44 (Zioncom Electronics (Shenzhen) Ltd.) STMAC.......: 46:55:62:E8:5C:2D MIC.........: B30AEACDD8C5C727D25DE254A25FBDB6 ESSID.......: RM BSSID.......: 8CC:02:B0:23:08 (zte corporation) STMAC.......: 44:66:FC0:1E1 (Guangdong Oppo Mobile Telecommunications Corp.,Ltd) MIC.........: D9EF630F7A1A00D41678313CE928093D I already uploaded "RM" handshake before, I think the passsword had been changed, so I capture the handshake again. Thank You.
# BSSID ESSID Encryption 1 8CC:02:B0:23:08 RM WPA (0 handshake) Choosing first network as target. Packets contained no EAPOL data; unable to process this AP.
Help needed in cracking this one. I have already tried rockyou, 000webhost, hashkiller, dark0de but found nothing. Country of origin: India Phone numbers start with 6, 7, 8, 9 @petrovivo1234 @Spliceguy Hope you guys could help me with this one. --- Double Post Merged, 13 Dec 2020, Original Post Date: 12 Dec 2020 --- @petrovivo1234 Gpuhash cracked it but I am still stuck at this one. Kindly help me. --- Double Post Merged, 13 Dec 2020 --- @longshanks can you help me with this handshake bro. Gpuhash cracked it but i am stuck.
Hi @petrovivo1234 @Spliceguy @longshanks , any chance on cracking the 2 handshake? I have further tried with GPUHash, no way of cracking it. Hope you all can help. Thanks.
WPA*01*b35a01b220fe7a51f478158ce407c3d2*fc4ae9381eb3*acde487dd26d*4973656c6c65646d7972747832303630666f72505335*** I have only this line left. Help please...