TP-Link wpa Dictionary Attack Possible?

Discussion in 'Dictionary, Password & Wordlists' started by denorider, 21 Apr 2015.

  1. denorider

    denorider Well-Known Member

    Joined:
    7 Feb 2014
    Messages:
    9
    Likes Received:
    4
    Hi Guys, I have found an approach for cracking TP-Link wpa by using some algorithm in this website

    http://www.backtrack-linux.org/forums/showthread.php?t=62673

    However, I dont understand how it work and how we can dictionary wpa attack.

    Have anyone tried before or can it improve to a better version? Or does anyone know how to crack TP-Link router, because I tried several times with pixiewps, reaver , bully , minidwep.....still cannot crack it.
     
  2. Demosthenes

    Demosthenes Well-Known Member
    VIP

    Joined:
    16 Apr 2014
    Messages:
    83
    Likes Received:
    53
    Already tried it, it no workie.
     
  3. denorider

    denorider Well-Known Member

    Joined:
    7 Feb 2014
    Messages:
    9
    Likes Received:
    4
    The method of pixiewps require particular Ralink chipset, but Dominique said that by analyzing other brand's chipset, actually can extend the usage of pixiewps to other router brand

    tp://video.adm.ntnu.no/pres/549931214e18d
     
  4. ciccio2

    ciccio2 Well-Known Member

    Joined:
    8 May 2015
    Messages:
    34
    Likes Received:
    25
    is there a good dictionary for them?
     
  5. wawawa3

    wawawa3 Active Member

    Joined:
    7 Apr 2015
    Messages:
    35
    Likes Received:
    12
    If pixiewps fails, can you capture a handshake? If so, crunch a .lst of 8 digits and aircrack-ng or pyrit against it and see if that gets you in. Otherwise you can only move on to very advanced measures involving social engineering.
     

Share This Page

Loading...