I requested Iml-76 for bruteforce/dict attack from his own collection of dict files/machine. & People here are always helpful. Found no other thread in hurry to post for this kind of request. So posted in my own thread.
Post it here..and you will get your key. https://xiaopan.co/forums/threads/wpa-wpa2-auditing-service.3739/page-206#post-86672
Can someone help me with this? captured handshake: PMKID when i convert .cap to hash found this: WPA*01* cd68bd50555736d927aa22f1340babb8 * 0495e649c301 * b4c0f5928d69 * 66616631393533 *** ps : 66616631393533 in wireshark give me this name : faf1953 this is the original cap file below --- Double Post Merged, 5 Nov 2022, Original Post Date: 5 Nov 2022 --- 0495e649c301 : router MAC address b4c0f5928d69 : client MAC address 66616631393533: faf1953 : SSID --- Double Post Merged, 8 Nov 2022 --- bro any help
Hey I am having trouble with these hashes (have tried many wordlists) Can anyone help? Any help is appreciated --- Double Post Merged, 20 Dec 2022, Original Post Date: 17 Dec 2022 --- Can anyone help me with this hash ? WPA*02*8e38760922355979773f75995915a113*d807b6adcbf0*54ef92b3a43f*54502d4c696e6b*18adfa533a1c91734ff7b914562df1a789c622b07e213f45c5057094df54a255*0103007502010a000000000000000000013b020751bc10d70133f775966e55e641eba58f411131f15aa9318816b29beed2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001630140100000fac040100000fac040100000fac020000*02 --- Double Post Merged, 21 Dec 2022 --- Guys can anyone help with this cap
The name of this email thread is "Password found in gpuhash.me within minutes". All your caps have FAILED on gpuhash.me
Hey guys, I have tried weakpass_v3 (1,134,583,776 passwords) against this CAP file. Unfortunately, I think only option left is bruteforce. I am not super skilled at this, I would really appreciate if you crack it for me, or just give me some tips and will do it myself. Also, GPUhash me cracked it in the matter of seconds. (Verify ID: BeeUzz8KAK)