netgear31 tried word list but the computer don't have the power it will take 11days can some give this cap a try Session..........: hashcat Status...........: Running Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL) Hash.Target......: NG31/12234_1660075548.hc22000 Time.Started.....: Wed Aug 10 06:27:56 2022 (9 secs) Time.Estimated...: Sun Aug 21 15:36:01 2022 (11 days, 9 hours) Kernel.Feature...: Pure Kernel Guess.Base.......: File (netgear-spectrum7mb.txt), Left thanks:
Hello everyone! Welcome, this is my first post here First of all, I noticed you collect default passwords for netgears. I was making bug bounty on some netgear nighthawks and remember two default passwords on the devices i tested. Those were: cloudydaisy243 ancientbox843 Second thing is, I'm currently breaking two Spectrum passwords, but on CoreM it takes ages. On your wordlist it's running for 48 hours without a success now I'm posting one handshake file as the second is too big to upload for now Any help appreciated ! --- Double Post Merged, 22 Aug 2022, Original Post Date: 22 Aug 2022 --- Hello once again, i stripped the second file so that it is small enough for the upload. I would appreciate some help with this one as well. It is already hccap, but website didn't allow to upload me that with such extension, so I changed that to cap
You're very welcome. Please attach the "original" MySpectrum's cap. Use this... https://gofile.io/welcome Or https://www.onlinehashcrack.com/tools-cap-to-hash-converter.php to convert it to PMKID.
Sure, My corporate network blocks the urls you provided, so I'd need to make that later today, when I'm outside! I appreciate your help so far! Thanks ! --- Double Post Merged, 23 Aug 2022, Original Post Date: 22 Aug 2022 --- This is the converted WPA key: WPA*02*4a7747931623c43fa8ef5b5714e787de*289efc7d7196*1c1ee30054e6*4d79537065637472756d5769466939302d3247*7e924e8f7ac7d94f4a1264632d7b1324da9fdef342314abcbd17e4dd4cfc7906*0103007502010a000000000000000000011b1610506290785a6a30857a189c8887f4b27c5776f347cae4c84aa6e5735f3e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001630140100000fac040100000fac040100000fac020000*02 Thanks in advance!
gpuhash.me spent 114 minutes on one and 141 minutes on the other. And found nothing. They were running between 4.2 and 6.5 million passwords a second. They were only running one WPA at a time. That's over 2 days non-stop on my computer. And they cannot even come up with yellowpoodle. What an embarrassment.
Hello everyone, I am new here Can someone help me with this ? made a basic search on gpuhash(dot)me showed be found within 15 mins, I have tried both handshake cap files myself all 8 digits of numbers and 1 lowcase character + 7 digits numbers, and many other lists found available online but with no luck. My computer is normal one and slow Thank you in advance and I would like to make a donation as appreciation to your help
Hashcat cracked this one but the password is: admin Which is too small for wpa. Must be some non-english characters in there also? DaHua_Wireless_06D7:admin I used the following: hashcat.exe -m 22000 dahua.hc22000 -r rules\best64.rule rockyou.txt
Hi alexb, thank you so much for your help. You are amazing. I have checked and found the reason why it is less than 8 digits, that is because the wifi router is under WEP mode By the way, what is your Paypal account, I would like to send you a donation. Thank you again --- Double Post Merged, 24 Aug 2022, Original Post Date: 24 Aug 2022 --- and this one ' EC-26-CA-6D-0E-72_handshake.hccapx ' because the cap file size is too big, so I converted it to hccapx file form
Hello, could someone try this one please, just delete the .txt first as it would not allow me to upload hccapx
Did not save it, rebooted a live image only hccapx. --- Double Post Merged, 11 Sep 2022, Original Post Date: 11 Sep 2022 --- Hello again, managed to capture a .cap , would be very grateful if someone could crunch it as it would take forever on my laptop. Thank you.