Tyvm, I will save a couple months and deff get a better rig. gpu cracking is exciting lol. Maybe you could help me out with a problem im having. Im on a fresh kali rolling install to my hdd and cant seem to get cudahashcat to function at all. Is it a bug? what do you use to crack wpa? cuda pyrit? I downloaded and installed oclhashcat via both hashcat site and through terminal from kali rolling repo. I appreciate the help my friend. --- Double Post Merged, 27 Feb 2016, Original Post Date: 27 Feb 2016 --- success. took 3 seconds. root@android:~# pyrit -r hs/out.cap attack_db Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com This code is distributed under the GNU General Public License v3+ Connecting to storage at 'file://'... connected. Parsing file 'hs/out.cap' (1/1)... Parsed 3 packets (3 802.11-packets), got 1 AP(s) Picked AccessPoint 6c:b0:ce:01:xx:xx ('NETGEAR10') automatically. Attacking handshake with Station d8:55:a3:b6:33:bf... Tried 4138186 PMKs so far (34.1%); 4025084 PMKs per second.d. The password is 'fluffycello632'.
Ok so I get that pyrit is much faster than Aircrack at brute forcing handshakes. I cracked one on my pretty basic laptop both ways to compare. Aircrack was able to process 1800+/wps right from the first command, and get through the Rockyou list in about an hour. Pyrit was about to do 30,000+/PMC's a second once I generated the batch db or whatever it's called. So yes it's much faster, even without a gpu, but generating the db took about as long as Aircrack, so it was about the same in the end. Am i missing something here? I know its crap to use a CPU only for cracking, but how is pyrit actually faster when it takes so long to generate the batch file??
The batch file process creates rainbow tables. Now if you have a lower end gpu like me lol it seems as though its takes around the same amount of time compared to cpu cracking but its not. It took me 15 mins to batch a 330 meg password list and took you an hour. Now i only have a low end gpu gtx 460 and i am still 4 times faster then you. 20175 PMKs per second was the speed of my last batch. Now imagine having a higher end gpu like a titan X capable of over 280,000. 15 times faster then my gpu. Takes them about a minute i would figure. 2 mins tops. --- Double Post Merged, 27 Feb 2016, Original Post Date: 27 Feb 2016 --- phoenixcoder you probably cracked this in 10 seconds? over 2 mins for me. Out comes the 24dbi grid antenna. NETGEAR10:6cb0ce01d99d:d855a3b633bf:fluffycello632 Session.Name...: cudaHashcat Status.........: Cracked Input.Mode.....: File (/root/hs/ng/ng1.txt) Hash.Target....: NETGEAR10 (6c:b0:ce:01:d9:9d <-> d8:55:a3:b6:33:bf) Hash.Type......: WPA/WPA2 Time.Started...: Sat Feb 27 02:03:39 2016 (2 mins, 29 secs) Speed.GPU.#1...: 19896 H/s Recovered......: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts Progress.......: 2949120/20808000 (14.17%) Rejected.......: 0/2949120 (0.00%) Restore.Point..: 2936832/20808000 (14.11%) HWMon.GPU.#1...: -1% Util, 58c Temp, 42% Fan Started: Sat Feb 27 02:03:39 2016 Stopped: Sat Feb 27 02:06:08 2016
Can you explain what your issue with cudahashcat? What command do you run? Any error messages? I see in a later post, cudahashcat ran fine. Regarding your question about how long it took me to crack it. Find below the screenshot showing 11 seconds
I worked out the Probs in cudahashcat and it's working fine now. What kind of rig do you run? Very impressive. 20x faster than me. 190,000 h/s roughly eh. It's good to meet you bro. Cheers from British Columbia, Canada.
Hello, Would someone like to try the attached cap. I used hashcat and the Netgearxx wordlist 1.05, and no dice. I have a feeling the pass has been changed. Thankx
It was not in the regular Netgear word list but the extended word list revealed the password below: NETGEAR55:88c9d0cb2ad4:a06391b9cd0c:exoticmesa086 We have found new noun, 'mesa'.
No, I don't think so because that is not how I would have named it. This one has all the adjectives and nouns combined but without the digits.
I just tried 3 MyCharter wifis. No luck with the mycharter word list. Could help add more adjectives or nouns to the list. Any help would be appreciated. ESSID are as follows : "MyCharterWiFi48-2G" "MyCharterWiFi90-2G" and "MyCharterWiFie2-2G Thank you again! a) I have attempted to crack the network/s using the following methods: pyrite using the 123.txt MyCharter wordlist b) I have tried the following password/s formats: Adjective + Noun + 3 digits c) Mac Address: MyCharterWiFi48-2G 2C-30-33-43-E7-48 MyCharterWiFi90-2G 44-94-FC-8C-F8-90 MyCharterWiFie2-2G A0-63-91-F1-E3-E2 d) Network Name: "MyCharterWifi48-2G" "MyCharterWifi90-2G" "MyCharterWifie2-2G" e) ISP: Charter Communications f) Model: g) Country: USA h) Phone number format/s: 9091111111 i) I believe the network could be in this format/s: adjective + noun + 123 j) I believe it to be a default password? Yes/No: ??
MyCharterWiFi48-2G:2c303343e748:b0a737da0391:sweetnest080 MyCharterWiFi90-2G:4494fc8cf890:a0f45089dbf9:perfectcello230 MyCharterWiFie2-2G:a06391f1e3e2:fcc2de0a78e8:kindphoenix841 All the passwords above are already in the regular Netgear wordlist. Apparently not all the Charter Wifi passwords start with an upper case.
Thank you. I actually just ran it through the MyCharter wordlist with no hits. I will try more with the Netgear lists. Thank you
Just tried it on a NETGEAR router with the 1.05 list to no avail. Perhaps someone can help me here? Haha
Netgear24 password please --- Double Post Merged, 11 Apr 2016, Original Post Date: 11 Apr 2016 --- Hi,can you please help me with netgear24 password.
Sorry, I ran it through my huge adjective-noun list and still the key was not found. I also tested it against 8 and 9 digits, and my word lists but still nothing came up. --- Double Post Merged, 11 Apr 2016, Original Post Date: 11 Apr 2016 --- You will need to post a captured handshake for someone to help you.
I have been finding great use out of Passcape Wireless Password Recovery Pro 3.3.5.329 portable. This is for Windows users. Allows Gear Junkies Version 5 Password list to be inserted and will crack Netgear handshakes in Windows comfortably. Supports GPU for those with the cards. Other abilities include great progress meters. Gui shows time to go till completion,etc etc. Look under tools and utilities for wordlist sorting functions (for other wordlists not this one) and other functions such putting the revealed password in to reveal hash etc. Don't worry about words unverified. It just means the program hasnt found the password yet. ie your getting ready to start. Any doubts on handshake integrity use wireshark to check first or the other methods described by others in this thread. Will post half here and then second half of rar after. Love to hear reviews of GPU users. --- Double Post Merged, 12 Apr 2016, Original Post Date: 12 Apr 2016 --- And now Part 2 of the File. In reference to this,I used an old laptop with no GPU and wanted to expand Windows possibilities with Xiaopan to get a result. Found on this exploration, that Aircrack GUI version did not work (its been abandoned), Elcomsoft in this sites programs folder didn't work effectively in relation to time but then I remembered this Passcape Wireless Password Recovery, that I had previously downloaded. Xiaopan, Wireshark, Gear Junkie's V5 list and this program go really well together. Anyway it was an experiment, thats my excuse to the Linux community! Enjoy.
First and Foremost thanks so much everyone for your support I've learned so much in so little time! Would you please help me with this .pcap? NETGEAR62 Thanks a million in advance!