I have tested this against 8 and 9 digits, and my word lists without any luck. --- Double Post Merged, 9 Nov 2015, Original Post Date: 9 Nov 2015 --- I have tested both and found the key for one of them: malik49:1caf05f74793:bcf685103480:35207467 The default key for P14G-SPOT-205570 is 10 Upper Hex. It will take me too long to go through it but if you look around there are others who can do it. --- Double Post Merged, 9 Nov 2015 --- Thanks For try this. Yes, But not Share the result.[/QUOTE] There is no result to share for this capture. I saw you requests for this and other Delta Networks captures in other forums too but never saw any results either. If this is a default SSID, you could find out and let us know the default key space.
please any one find the password . ESSID : ASD BSSID :68-15-90-BF-D6-13 starting from 05 .... 10 digit .. country saudia arab.
@asma Read the rules Clean your Caps Sorry @PhoenixCoder It's down to @Mr. Penguin at the moment Just click the Report and he may delete it.Or just don't crack any caps from people who break the rules.
Today's your lucky day, here you go ASD:681590bfd613:d087e2dac0c1:0535084807 If the password helped you out, you can consider donating to show your gratitude. --- Double Post Merged, 11 Nov 2015, Original Post Date: 11 Nov 2015 --- 8 uppercase is a little time consuming (a few days non-stop) and requires a lot electricity. Ae there any guarantees that it's 8 alphanumerical char uppercase?
Hello sir @gearjunkie can you help me try out below cap file for my luck or its bad cap file. thank you very much for your help. Vendor: Unifi SSID: wifiunifi MAC Address: C8-D3-A3-DC-5B-B0 Password format: no idea Country : Malaysia Vendor: Unifi / Maxis SSID: IVY02 MAC Address: 94-FB-B3-89-C2-CE Password format: no idea Country : Malaysia Vendor: Unifi SSID: 3994522@unifi MAC Address: BC-96-81-20-FC-37 Password format: no idea Country : Malaysia Btw Sir @gearjunkie , do you have new wordlist for Malaysia Maxis Vendor? Cheers...
Both your captures are bad. You might want to get closer to the AP to get better captures. You also posted two IVY02 captures and missed uploading 3994522@unifi. Somebody correct me if I am wrong but I believe Maxis Fibre uses 10 Upper Hex. You can use maskprocessor to generate the word list or specify it directly in hashcat. It will take a huge amound of space if you generate the word list file. EDIT: Looks like I am wrong and Maxis Fibre uses 8 characters (uppercase and digits). That translates to 2821109907456 possible combinations. Info is from https://znarl.jobrate.org/mediawiki/index.php/Wireless_Security_On_Maxis_Fiber_Router. You can also see from https://forum.lowyat.net/topic/3456128/all that they use a Thomsom TG784n.
Awesome guys...please try this hanshake...thnks for respond. BSSID: 94:FB:B3:F3:BE:45 ESSID: duanza86@unifi Router Brand: ------- Country: Malaysia vendor: Unifi BSSID: 70:62:B9:E3:9D:OA ESSID: skym12@unifi Router Brand: Realtek Country: Malaysia Vendor: Unifi --- Double Post Merged, 12 Nov 2015, Original Post Date: 12 Nov 2015 ---
I can confirm augustocss's results. The password is correct, check the output below: duanza86@unifi:00e04c833411:94fbb3f3be45:1234567890 Session.Name...: reyman76 Status.........: Cracked Input.Mode.....: Mask (?d?d?d?d?d?d?d?d?d?d) [10] Hash.Target....: duanza86@unifi (00:e0:4c:83:34:11 <-> 94:fb:b3:f3:be:45) Hash.Type......: WPA/WPA2 Time.Started...: Fri Nov 13 17:42:20 2015 (13 secs) Speed.GPU.#*...: 2.13 MH/s Recovered......: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts Progress.......: 2891776/10000000 (28.92%) Rejected.......: 0/2891776 (0.00%) Restore.Point..: 237568/1000000 (23.76%) HWMon.GPU.#1...: 99% Util, 80c Temp, 52% Fan HWMon.GPU.#2...: 100% Util, 69c Temp, N/A Fan HWMon.GPU.#3...: 87% Util, 73c Temp, N/A Fan Started: Fri Nov 13 17:42:20 2015 Stopped: Fri Nov 13 17:42:35 2015
i dont know what is wrong...im try connect with 3 device but all fails[/QUOTE] get a new handshake, maybe the password has changed.
i dont know what is wrong...im try connect with 3 device but all fails[/QUOTE] You might try moving closer to the access point, sometimes being too far messes up the handshake and thus give a false negative
Huh, that's weird. They test good before I stripped, and test bad after. I read somewhere that that can happen, I guess it would be better to do it manually with wireshark? These are the full .caps; they're not that big. 00west-01.cap - SSID= 200 WEST FOY lnk-01.cap - SSID= linksys_den 00lnkdenext-01.cap - SSID= linksys_den_EXT