Hey Buddy The new handshake captured. ESSID : SKYLINK AHMED 03002723694 BSSID : C0-4A-00-DE-97-56 http://ad-file.com/60331173
Hey Everyone, can anyone please check out this one for me , I think its phone number and start with 39@@@@@@@@ Thanks you a lot I apreciate it
Yeah but a highly compressed one is quite reasonable in size.. . Would love to see @kevsamiga's rig perform some tests for us. Screenshot? @gearjunkie 2x Intel Quadcore's and 2x 4870x2's hardware assist for munching 4 GPU's through WPA's with Elcomsoft in Windows, while Linux does all the dirty work. ;-)
It's true, I've found a compressed dictionary with numbers from 99999999 to 00000000 in this forum. And I've loaded it on my android phone with aircrack-gui... but it scan only 270 key/sec! So can someone with a GPU and a computer can try to find the key please? sorry for my english
Thanks for the reply. I had got the Alejandro key already...i paid a third party..however, whenever I try wps attack..the wireless router times out and lock the router and advice or link me to a tutorial?
I would love to see some screenshots of it too! I bet it gets pretty warm in the room when you go through WPAs. --- Double Post Merged, 15 Jan 2015 --- I managed to get one out of the two you posted. NUR_IMAN:2002af2082f1:fc8b97232960:iman5681 --- Double Post Merged, 15 Jan 2015 --- I found one of yours too! USJHEIGHTS:20107a97815e:2cd05ae52e12:0122332465 --- Double Post Merged, 15 Jan 2015 --- Sorry, but nothing came up for this handshake.
Hi Gearjunkie, Help Please Vendor: unifi (Malaysia) Password format: unknown SSID: 3994522@unifi BSSID: BC-96-81-20-FC-37 Vendor: unifi (Malaysia) Password format: unknown SSID: ABCDEFG123 BSSID: A4-B1-E9-97-CA-FF Vendor: unifi (Malaysia) Password format: unknown SSID: aivee02@unifi BSSID: 94-FB-B3-89-C2-CE TQ Gearjunkie
Its a Malaysian router.I believe it could be 10-12 keys alpha-numeric..no problem just leave it alone. Thanks.
oh...no! Sorry... I'll try this evening to capture the correct handshake! thank you very much PS: how can I check if there is the correct handshake? I've opened the CAP uploaded with Wireshark, applied the filter "eapol || wlan.fc.type_subtype == 0x04 || wlan.fc.type_subtype == 0x08" and in the file seems to be all Key message... From 1 to 4... So now I don't understand how check the CAP file before upload here... Can someone tell me how can I check? best regards
Oh I downloaded the wrong cap file from here. It was late last night. Too many caps in this thread. Testing now. Should take an hour. --- Double Post Merged, 15 Jan 2015 --- Here you go @cobra82
Yes, it is likely to be alphanumeric... typically names mixed with numbers. Unfortunately there is no feasible way for me to brute force all alphanumeric combinations and I still do not have a decent list of Malaysian names.
Need help Spoiler ESSID: Djordjevici BSSID: E8-94-F6-66-90-04 Country: Serbia Device: TL-WR740N Security: WPA-PSK + WPA2-PSK Cipher: TKIP+CCMP pass is probably lower case alphanumeric
I do not have much experience with WPS attacks but I do know it is possible to increase the internal between tries. Hopefully somebody with more experience will chime in.
gearjunkie could you please check this one for me, I actualy dont know a lot but : Name : bones MAC : 00-1A-3F-6A-90-50 Handshake with attach. Thank you in advance
Hey @Wadixman I've tested the cap file, its definitely not 39xxxxxxxx. Couldn't help much as I have a small machine which hit only 7000 k/s..maybe @gearjunkie could help you out, his machine is 8x faster than mine. p/s Please do not double post.