WPA / WPA2 Auditing Service

Discussion in 'Community Services' started by Mr. Penguin, 11 Apr 2013.

  1. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    Here you go:

    HUAWEI-B315-0036: 64800754
     
    • Like Like x 1
  2. Ok thanks for the update.
    If you have any luck with the SSID - suhash * WiFi * let me know
    Thanks anyway
     
    • Like Like x 1
  3. bingo5me

    bingo5me Member

    Joined:
    5 Dec 2015
    Messages:
    18
    Likes Received:
    15
    How much time you ran all of the dictionary above?
    What is your CPU spec?
     
    • Like Like x 1
  4. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    It was not in the NETGEAR dictionary, it was a 10 digit password as seen below

    NETGEAR61: 6263765629

    Hope that helps you.
    --- Double Post Merged, 3 Jun 2016, Original Post Date: 3 Jun 2016 ---
    Have a cluster server made up of several desktops with a total of 4 graphics cards that totals a WPA cracking speed of around a million passwords per second (1000 KH/s).

    Here is how long each one took in minutes:

    [xtable=cellpadding:0|cellspacing:0|433x@]
    {tbody}
    {tr=@x11}
    {td=top|154x11}
    Keyspace Name
    {/td}

    {td=top|144x11}
    Keyspace Size
    {/td}

    {td=top|135x11}
    Time in Minutes
    {/td}
    {/tr}
    {tr=@x21}
    {td=top|154x21}
    8 HEX Uppercase{/td}

    {td=top|144x21}
    4294967296
    {/td}

    {td=top|135x21}
    71.58
    {/td}
    {/tr}
    {tr=@x21}
    {td=top|154x21}
    8 HEX Lowercase{/td}

    {td=top|144x21}
    4294967296
    {/td}

    {td=top|135x21}
    71.58
    {/td}
    {/tr}
    {tr=@x21}
    {td=top|154x21}
    8 Digit Attack{/td}

    {td=top|144x21}
    100000000
    {/td}

    {td=top|135x21}
    1.67
    {/td}
    {/tr}
    {tr=@x21}
    {td=top|154x21}
    9 Digit Attack{/td}

    {td=top|144x21}
    1000000000
    {/td}

    {td=top|135x21}
    16.67
    {/td}
    {/tr}
    {tr=@x21}
    {td=top|154x21}
    10 Digit Attack{/td}

    {td=top|144x21}
    10000000000
    {/td}

    {td=top|135x21}
    166.67
    {/td}
    {/tr}
    {tr=@x21}
    {td=top|154x21}
    adjective_noun_3d{/td}

    {td=top|144x21}
    20808000
    {/td}

    {td=top|135x21}
    0.35
    {/td}
    {/tr}
    {tr=@x21}
    {td=top|154x21}
    adjective_noun_1d{/td}

    {td=top|144x21}
    208080
    {/td}

    {td=top|135x21}
    0.00
    {/td}
    {/tr}
    {tr=@x21}
    {td=top|154x21}
    Super-WPAv2{/td}

    {td=top|144x21}
    2161953941
    {/td}

    {td=top|135x21}
    36.03
    {/td}
    {/tr}
    {tr=@x21}
    {td=top|154x21}
    Distributed.WPA{/td}

    {td=top|144x21}
    262372509
    {/td}

    {td=top|135x21}
    4.37
    {/td}
    {/tr}
    {tr=@x21}
    {td=top|154x21}
    SkullSecurity{/td}

    {td=top|144x21}
    57042303
    {/td}

    {td=top|135x21}
    0.95
    {/td}
    {/tr}
    {tr=@x21}
    {td=top|154x21}
    rockyou{/td}

    {td=top|144x21}
    14343296
    {/td}

    {td=top|135x21}
    0.24
    {/td}
    {/tr}
    {tr=@x21}
    {td=top|154x21}
    BIG-WPA-ALL{/td}

    {td=top|144x21}
    304633555
    {/td}

    {td=top|135x21}
    5.08
    {/td}
    {/tr}
    {tr=@x21}
    {td=top|154x21}
    18_in_1{/td}

    {td=top|144x21}
    1130347502
    {/td}

    {td=top|135x21}
    18.84
    {/td}
    {/tr}
    {tr=@x21}
    {td=top|154x21} {/td}
    {td=top|144x21} {/td}
    {td=top|135x21} {/td}
    {/tr}
    {tr=@x21}
    {td=top|154x21}
    TOTAL{/td}

    {td=top|144x21}
    {/td}

    {td=top|135x21}
    394.03
    {/td}
    {/tr}
    {/tbody}
    [/xtable]

    So in total 394 minutes i.e. roughly 6.5 hours.
     
    • Like Like x 3
  5. bingo5me

    bingo5me Member

    Joined:
    5 Dec 2015
    Messages:
    18
    Likes Received:
    15
    That's really fast.
    My CPU can't afford that, even 8 digits passwoods will take me 1 week.
     
    • Like Like x 1
  6. Asian

    Asian Active Member

    Joined:
    19 Jan 2016
    Messages:
    26
    Likes Received:
    21
    Can someone help me this.

    a) I have attempted the network/s using reaver. Already tried it for 5 hours but couldnt get the password.
    b) I have no dictionary, only depending on the wps attack.
    c) Mac Address: D0:3E:5C:3E:FD:FC
    d) Network Name (ESSID): tahir
    e) Model: HUAWEI
    f) Country: Pakistan
    g) I don't believe it to be a default password.

    Thanks.
     

    Attached Files:

    • Like Like x 1
  7. janmar

    janmar Member

    Joined:
    6 Feb 2016
    Messages:
    4
    Likes Received:
    4

    boss!! you are a good help thank you so much. but unfortunately, the user has changed the password before i tried to use it. :( how unlucky i was, maybe they detected that their modem are being :censored** up by the wps reaver attack and linset so they were alarmed because of it. if you could help me again crack these WPA's for me, i would really appreciate it brother.

    for home.cap

    a) I have attempted to crack the network/s using reaver but its not vulnerable, no wps available. tried rockyou.txt not found
    b) I have tried the following password/s formats: i have no other dictionary only depending on the wps attack and rockyou
    d) Network Name: Home Broadband
    c) mac address: 58:98:35:66:93:9B
    e) ISP: STC i think (not sure)
    f) Model: according to my wps cracker its technicolor
    g) Country: SAUDI ARABIA
    j) I believe it to be a default password? Yes, beacuse the network name has not changed yet. Hoperfully

    for dlink.cap

    a) I have attempted to crack the network/s using reaver but its not vulnerable, no wps available. tried rockyou.txt not found
    b) I have tried the following password/s formats: i have no other dictionary only depending on the wps attack and rockyou
    d) Network Name: dlink-F034
    c) mac address: c8:BE:19:74:F0:34
    e) ISP: (not sure)
    f) Model: according to linset it is DIR-505
    g) Country: SAUDI ARABIA
    j) I believe it to be a default password? Yes, and the format is, 5lowercase and 5 digits ex. akbdj19638

    ihope you might help me with these boss.
     

    Attached Files:

    • Like Like x 1
  8. @PhoenixCoder

    I believe the suhash * WiFi * network password is a combination made of the digits - 0,1,2,3,4,5,6,7,8,9 in a 8 digit format with repeatitions allowed - like a WPS key - that is it is the default password.

    Please continue the attack with this idea.
    Thanks
     
    • Like Like x 1
  9. futureorkun

    futureorkun Well-Known Member

    Joined:
    7 Jun 2012
    Messages:
    72
    Likes Received:
    52
    a) I have attempted the network/s using reaver. Already tried it for 47 hours but couldnt get the password.
    b) I have no dictionary,wps attack is closed.
    c) Mac Address: 5C-F4-AB-49-59-E2
    d) Network Name (ESSID): TTNET_ZyXEL_U9A3
    e) Model: ZyXEL VMG3312-B10B
    f) Country: Turkey
    g) I don't believe it to be a default password.
    --- Double Post Merged, 11 Jun 2016, Original Post Date: 10 Jun 2016 ---
    Please! Help me cracked....
     

    Attached Files:

    • Like Like x 1
  10. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    Tried a few dictionaries, 8 digit, 9 digit, and 01 followed by 8 digits but no luck.

    Now trying 10 digit followed by more dictionaries but am not optimistic
     
    • Like Like x 1
  11. aljuna10

    aljuna10 Member

    Joined:
    27 May 2016
    Messages:
    6
    Likes Received:
    4
    @PhoenixCoder can you try with 10 digit dicctionary this cap ?
     
    • Like Like x 1
  12. b0ssau

    b0ssau Active Member

    Joined:
    9 May 2013
    Messages:
    3
    Likes Received:
    3
    Model: Netgear VEGN2610
    Mac: 80:37:73:C7:9A:3F
    SSid : FoxtelHub9A3F

    -----
    Model: Netgear EVG2000
    Mac: e0:46:9a:63:a8:86
    SSid: BigPond048C


    -----
    Model: Netgear CG3100D
    Mac:6c:b0:ce:80:99:b0
    SSid: pretty fly for a wifi


    Thanks in Advance
    --- Double Post Merged, 12 Jun 2016, Original Post Date: 12 Jun 2016 ---
    Beeen Cracked .. Thank You

    Model: Netgear EVG2000
    Mac: e0:46:9a:63:a8:86
    SSid: BigPond048C
     

    Attached Files:

    • Like Like x 1
  13. nightyman

    nightyman Active Member

    Joined:
    2 May 2013
    Messages:
    1
    Likes Received:
    1
    Hello,
    I need your help to get the password of those router
    Thank you in advance and sorry if i disturb you

    Routers info :
    a) I already tried to crack those routers for 3 days but no luck (Pixiedust method to get WPS PIN).
    b) I have no dictionary, i tried only WPS attack.

    Router 1
    c) MAC Address : 30:91:8F:BF:34:C1
    d) Network Name : TNCAPBF34C1
    e) ISP : Maroc Telecom
    f) Model : Technicolor

    Router 2
    c) MAC Address : A4:B1:E9:BD:98:15
    d) Network Name : TNCAPBD9815
    e) ISP : Maroc Telecom
    f) Model : Technicolor

    Router 3
    c) MAC Address : 30:91:8F:C4:6E:2B
    d) Network Name : DELTA01 (The network name is changed ... the default name i think is : TNCAPC46E2B)
    e) ISP : Maroc Telecom
    f) Model : Technicolor

    Router 4
    c) MAC Address : 82:BA:EE:FB:FE:3F
    d) Network Name : TNCAP1613B8
    e) ISP : Maroc Telecom
    f) Model : Technicolor

    g) Country: Morocco
     

    Attached Files:

    • Like Like x 1
  14. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    Seems like it's your lucky day

    Speedy-0396C3:4065216376
     
    • Agree Agree x 1
  15. aljuna10

    aljuna10 Member

    Joined:
    27 May 2016
    Messages:
    6
    Likes Received:
    4
    Thank you very much !!! it works perfectly !
     
    • Like Like x 1
  16. YssDiamond

    YssDiamond Active Member

    Joined:
    7 Aug 2015
    Messages:
    10
    Likes Received:
    3
    does anyone know if its possible to get the password from networks that has this type of password >> ujzwzyvys8Kx and where i can get the dictionary file. thanks in advance !
     
    • Like Like x 1
  17. chkout

    chkout Well-Known Member

    Joined:
    7 Apr 2014
    Messages:
    11
    Likes Received:
    10
    can someone help me crack this i have tried the netgearxx dictionary
    ESSID: NETGEAR50
    BSSID: 6C:B0:CE:F2:B2:C4
     

    Attached Files:

    • Like Like x 1
  18. nanobius

    nanobius Active Member

    Joined:
    3 May 2015
    Messages:
    16
    Likes Received:
    15
    Hello, can you help me with these two?. I try to run the dictionary but my old samsungN150 cant even read the text fluidly. Thanx a lot.

    SSID: Telecentro-0f90
    Vendor: Telecentro
    MAC Address: 8C:10:d4:89:0F:96
    Router: Sagemcom Broadband SAS
    Country: Argentina (Spanish Language)
    Default Key Format: tele-xxxxxxx (numerical 7 digits)
    Another probably Default Key Format (newest) : xxxxxxxx (numerical 8 digits ) from 20000000 to 45000000
    Phone number format/s: 11xxxx-xxxx or 5411xxxx-xxxx


    SSID: Telecentro-Beta
    Vendor: Telecentro
    MAC Address: 48:5B:39:72:88:1C
    Router: ASUSTek COMPUTER Inc.
    Country: Argentina (Spanish Language)
    Default Key Format: tele-xxxxxxx (numerical 7 digits)
    Another probably Default Key Format: xxxxxxxx (numerical 8 digits ) from 20000000 to 45000000
    Phone number format/s: 11xxxx-xxxx or 5411xxxx-xxxx

    Thanks.
     

    Attached Files:

    • Like Like x 1
  19. @PhoenixCoder
    Any updates on the last attack I suggested to perform on the suhash * WiFi * ?
     
    • Like Like x 1
  20. PhoenixCoder

    PhoenixCoder Well-Known Member
    VIP

    Joined:
    4 Jul 2015
    Messages:
    211
    Likes Received:
    197
    [BCOLOR=#ff0000]Read The Rules[/BCOLOR]
    4) Make it Easy
    c) Ensure that a handshake was captured (in your case the cap is corrupted)
    e) Do not continually ask for your cap/s to be cracked. Once is enough.
     
    • Like Like x 1
    • Wow Wow x 1

Share This Page

Loading...