WPA / WPA2 Auditing Service

Discussion in 'Community Services' started by Mr. Penguin, 11 Apr 2013.

  1. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    *Sigh* At this point I feel I am beating a dead horse. To all members if you need help cracking your WPA handshakes follow the rules that are laid out in the first page of this forum posted by Mr.Penguin.

    @badchicken saying you "tried everything" does not help anyone. However saying things like the ones below DOES:
    1. I have attempted to crack the network/s using the following methods .........
    2. I have tried the following password/s formats .......
    3. I believe the network could be in this format/s
    4. I believe it to be a default password? Yes/No
    Moreover including the info below (or as much as you can) will guide those who attempt to crack the WPA in the right direction
    1. Mac Address
    2. Network Name
    3. ISP
    4. Model
    5. Country
    6. Phone number format/s

    In any case, the following attacks were attempted and failed against both handshakes
    • Super-WPAv2 Dict
    • 8 Digit Bruteforce
    • Netgear_0-99
    • Netgear_000-999
    • SkullSecurity Dict
    Remaining attacks to be attempted:
    • 0<8 Digit>
    • 01<8 Digit>
     
    • Like Like x 2
  2. badchicken

    badchicken Active Member

    Joined:
    28 Oct 2012
    Messages:
    8
    Likes Received:
    3
    Thank you for time and im sorry for my bad...
     

    Attached Files:

    • Laugh My Ass Off Laugh My Ass Off x 1
    • Crap Crap x 1
  3. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    So you apologize then repeat the problem? The main issue is sharing the handshakes without any background info or what you have tried that didn't work.
     
    • Funny Funny x 1
  4. badchicken

    badchicken Active Member

    Joined:
    28 Oct 2012
    Messages:
    8
    Likes Received:
    3
    Yes it got sent before i could finsh. Its a belkin and netgear from the usa.Ive tried reaver ive tried bully pixie dust.There not locked by the wash wlan0mon.Ive tried every thing from skull security.Plus ive tryed rock you many others private and public word lists thats 30 gigs. Ive tried all default passwords.Plus the gear downloaded from here.
     
    • Like Like x 1
  5. HoT_Pursuit

    HoT_Pursuit Well-Known Member
    Dev Team VIP

    Joined:
    20 Jul 2012
    Messages:
    81
    Likes Received:
    66

    Hi

    If wps turned on , try this pin code: 62211840
     
    • Like Like x 1
  6. Master.BoOsS

    Master.BoOsS Well-Known Member

    Joined:
    25 Jul 2014
    Messages:
    46
    Likes Received:
    44
    • Like Like x 1
  7. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    • Like Like x 2
  8. HoT_Pursuit

    HoT_Pursuit Well-Known Member
    Dev Team VIP

    Joined:
    20 Jul 2012
    Messages:
    81
    Likes Received:
    66
    I found one :D
    NETGEAR31:04a15196c072:784476911e4f: heavyairplane7
     
    • Like Like x 2
  9. Master.BoOsS

    Master.BoOsS Well-Known Member

    Joined:
    25 Jul 2014
    Messages:
    46
    Likes Received:
    44
    thanx man, i tried: 8 Digit, 9 Digit, 05xxxxxxxxx .......... without any result
    thank you for your answer
     
    • Like Like x 1
  10. HoT_Pursuit

    HoT_Pursuit Well-Known Member
    Dev Team VIP

    Joined:
    20 Jul 2012
    Messages:
    81
    Likes Received:
    66
    Hello all

    I try to crack these handshake, i use custom list /mobile number/land number/8 digits/tp-link assistant . but it can't cracked :android:.

    Note1: "t1.cap" this handshake for tp-link 740n & last password cracked is "sara2007".

    Note2: "aw1.cap" Router is "Sagem f@st 2704" (( I think )) from Orange.
     

    Attached Files:

    • ali.cap
      File size:
      293.4 KB
      Views:
      4
    • aw1.cap
      File size:
      9 KB
      Views:
      4
    • t1.cap
      File size:
      3.5 KB
      Views:
      4
    • Like Like x 1
  11. birdybike

    birdybike Active Member

    Joined:
    22 Dec 2014
    Messages:
    37
    Likes Received:
    35
    Hi Friend,

    May help me try below...thanks.

    Vendor: Unifi or Maxis
    ESSID : GWL
    MAC Address: 1C-87-2C-C6-82-34

    Vendor: Unifi or Maxis
    ESSID : Pete
    MAC Address: 9C-97-26-40-84-89
     

    Attached Files:

    • Like Like x 1
  12. meknb

    meknb Mod
    Moderator Dev Team VIP

    Joined:
    2 Jun 2012
    Messages:
    702
    Likes Received:
    203
    @clarkswalabis This is not a personal service for you, any cracked will be posted, Read the rules
    e) Do not continually ask for your cap/s to be cracked. Once is enough.
    You have been told several times Anymore will be reported and deleted Your caps also, also includes a ban.
    Rules for posting caps
    Failure to break any of the rules above may result in a forum ban.
     
    #1092 meknb, 14 Oct 2015
    Last edited: 14 Oct 2015
    • Like Like x 3
    • Informative Informative x 1
    • Get the Fuck Off Get the Fuck Off x 1
  13. ellisjuan

    ellisjuan Active Member

    Joined:
    12 Mar 2015
    Messages:
    7
    Likes Received:
    5
    Hi, I've tried to run mask tables on my laptop, and am only averaging about 1500k/s. I can't get my ancient video card to run opencl on anything (windows or linux), and would REALLY appreciate some help w/ processing power. Tried running Reaver on all three w/ no sucess, even with changing settings and running scripts to start and stop processes. 01-200.cap is the main one I'm trying to figure out.

    01-200 is a Netgear WNDR3400v3. I have tried the NETGEARxx list and '200%l%l%l%l%l' w/ no results.

    02-lnkden is a Linksys (not sure of the model). I have not tried anything on this one yet.

    03-lnkext is a Netgear router as far as I know (when looking at logs in Wireshark). 02-lnkden is on the same site (03-lnkext is acting as a repeater, AFAIK), and may have the same PW. I have also run the NETGEARxx wordlist on this one, again w/ no results.

    Thanks for any help in advance!
     

    Attached Files:

    • Like Like x 1
  14. aqwe1234

    aqwe1234 Active Member

    Joined:
    3 Mar 2015
    Messages:
    17
    Likes Received:
    13
    • Like Like x 1
  15. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    @aqwel1234 Will look into it


    Sent from my iPhone using Tapatalk
     
    • Like Like x 1
  16. adeil

    adeil Active Member

    Joined:
    12 Feb 2015
    Messages:
    16
    Likes Received:
    9
    please help me to crack these handshakes
     

    Attached Files:

    • Like Like x 1
  17. gearjunkie

    gearjunkie Well-Known Member
    VIP

    Joined:
    28 Aug 2014
    Messages:
    454
    Likes Received:
    481
    Going through some of the older captures here... Both captures above were tested against 8 and 9 digits, Italian phone numbers, and my word lists without any results.
    --- Double Post Merged, 29 Oct 2015, Original Post Date: 29 Oct 2015 ---
    Lucky for you both captures were cracked!

    Speedy-DABF56:90671cdabf5c:a49a58a32dea:1523037026
    tequeresmatar:4c257860c1bb:786a890ea6d8:1135953020
    --- Double Post Merged, 29 Oct 2015 ---
    I have tested this against 8 and 9 digits, Australian phone numbers, and my word lists without any luck. As mentioned before, it is very likely to be still on its default 10 upper hex.
    --- Double Post Merged, 29 Oct 2015 ---
    Here's your key:

    vimala:68489835d8b5:68764f870c1c:19960822
     
    • Like Like x 2
    • Winner Winner x 1
  18. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    • Like Like x 1
    • Winner Winner x 1
  19. birdybike

    birdybike Active Member

    Joined:
    22 Dec 2014
    Messages:
    37
    Likes Received:
    35
    Hope i'm the next lucky one...:happy::happy::happy:
     
    • Like Like x 1
  20. gearjunkie

    gearjunkie Well-Known Member
    VIP

    Joined:
    28 Aug 2014
    Messages:
    454
    Likes Received:
    481
    Sorry but nothing was found after testing again 9 digits, Malaysian phones, and my word lists.
    --- Double Post Merged, 30 Oct 2015, Original Post Date: 30 Oct 2015 ---
    Nothing was found here after testing against 8 and 9 digits, Turkey phones, and my word lists.
    --- Double Post Merged, 30 Oct 2015 ---
    Here is your key:

    Mike:b8e9378c1884:f07959e676c8:13131313
    --- Double Post Merged, 30 Oct 2015 ---
    You have a bad capture here.
    --- Double Post Merged, 30 Oct 2015 ---
    Tested both and found one:

    fadhlied@unifi:94fbb3843ac5:dc9b9c987b1f:0123837734
     
    • Like Like x 2
    • Winner Winner x 1

Share This Page

Loading...