WPA / WPA2 Auditing Service

Discussion in 'Community Services' started by Mr. Penguin, 11 Apr 2013.

  1. venzelx

    venzelx Well-Known Member

    Joined:
    10 Nov 2018
    Messages:
    36
    Likes Received:
    28
    can someone take a look at this PMKID and Handshake (from the same AP)

    7cf9e902157eca037c4c528f6e4b3f69*d46e0e8bc6da*f0a225ab1817*54502d4c494e4b5f4336

    thanks
     

    Attached Files:

    • Like Like x 1
  2. DadeMurphy

    DadeMurphy Member

    Joined:
    15 Dec 2018
    Messages:
    9
    Likes Received:
    9
    I tried BIG-WPA-LIST-1 ,BIG-WPA-LIST-2 and BIG-WPA-LIST-3 wordlist but can't find the password.

    Some friends say Malaysia wifi is using numeric. So what should I do?

    Find numeric wordlist online?
     

    Attached Files:

    • Like Like x 1
  3. mitchellgilmore23

    Joined:
    15 Nov 2018
    Messages:
    52
    Likes Received:
    44

    SSID set: BongFoongMoi@unifi

    The default SSID has been changed, so there is a 99% chance the password has also been changed. I dont know where you obtained the handshake from, but I'd suggest a straight dictionary attack on the language in your country as well as anything relating to whatever "BongFoongMoi" is.

    I tried both keyspaces shown below:

    * TP-LINK_#### - [0-9] - Len: 8

    - `?d?d?d?d?d?d?d?d`

    * TP-LINK_###### - [0-9A-F] - Len: 8

    - `?H?H?H?H?H?H?H?H`

    Both were exhausted. Sorry I couldn't be of more help.
     
    • Like Like x 2
  4. venzelx

    venzelx Well-Known Member

    Joined:
    10 Nov 2018
    Messages:
    36
    Likes Received:
    28
    Thank you for trying on my handshake
    So I should run a dictionary attack on them now , right ?
     
    • Like Like x 1
  5. mitchellgilmore23

    Joined:
    15 Nov 2018
    Messages:
    52
    Likes Received:
    44
    I believe so. After researching, TP-Link_C6 I dont believe is factory. The only factory SSID I saw were TP-Link_(4digit/letter) ex. TP-Link_4B9F
     
    • Like Like x 2
  6. my house

    my house Well-Known Member

    Joined:
    8 Dec 2014
    Messages:
    217
    Likes Received:
    134
    Nowadays, handshakes are so hard to crack :(
     
    • Like Like x 1
    • Agree Agree x 1
  7. sailor75s

    sailor75s Well-Known Member

    Joined:
    21 Dec 2014
    Messages:
    4
    Likes Received:
    3
    Anyone able to crack this one?

    SSID: MySpectrumWiFi0b-2G
    BSSID: 78:29:ED:FF:11:09
    Manufacturer : Askey
    Module : RAC2V1K
    Country : USA
     

    Attached Files:

    • Like Like x 1
  8. mitchellgilmore23

    Joined:
    15 Nov 2018
    Messages:
    52
    Likes Received:
    44
    Attachment not found
     
    • Like Like x 1
  9. carnivore1

    carnivore1 Well-Known Member

    Joined:
    22 Jul 2018
    Messages:
    128
    Likes Received:
    125
    I live in down town Huntington Beach also, failed to find this Askey router password, failed on a couple other of these types before...carnivore1
    --- Double Post Merged, 16 Dec 2018, Original Post Date: 16 Dec 2018 ---
    Is it Comcast or Frontier ISP?
     
    • Like Like x 1
  10. sailor75s

    sailor75s Well-Known Member

    Joined:
    21 Dec 2014
    Messages:
    4
    Likes Received:
    3
    thanks carnivore1
    --- Double Post Merged, 16 Dec 2018, Original Post Date: 16 Dec 2018 ---
    It's Spectrum
     
    • Like Like x 1
  11. carnivore1

    carnivore1 Well-Known Member

    Joined:
    22 Jul 2018
    Messages:
    128
    Likes Received:
    125
    Oh, thats the old Time Warner, usually they are netgear wordlist possibilities, but recently (last 3 I have run)...all have been changed or have Askety long numerical or mixed numerical + upper case passwords...carnivore1
     
    • Like Like x 1
  12. sailor75s

    sailor75s Well-Known Member

    Joined:
    21 Dec 2014
    Messages:
    4
    Likes Received:
    3
    I think so. I tried the netgear wordlist, but no luck.
     
    • Like Like x 1
  13. carnivore1

    carnivore1 Well-Known Member

    Joined:
    22 Jul 2018
    Messages:
    128
    Likes Received:
    125
    My old enemy network is finally gone, this has taken its place , ISP Frontier, essid Fios-HNAH6, PMKID file is 554a87e2676653823892011ff82dd149*d4a9281bfb16*f0a22538f653*46694f532d484e414836 Screenshot from 2018-12-15 21-29-09.png Now the I need help part, was already running a 8?H attack and computer just shut off, when restarting hashcat has message(see attachment)..how do i remove pid file?, where do i find pid?, no hashcat folder in kali root for me?? thanks carnivore1 I should add I have tried rebooting system and all other common sense procedures.
     

    Attached Files:

    • Like Like x 1
  14. mitchellgilmore23

    Joined:
    15 Nov 2018
    Messages:
    52
    Likes Received:
    44
    Its /root/.hashcat/... meaning it's a hidden folder. Go to the root directory in file explorer and in the top right in the menu, click "show hidden folders"
     
    • Like Like x 1
  15. carnivore1

    carnivore1 Well-Known Member

    Joined:
    22 Jul 2018
    Messages:
    128
    Likes Received:
    125
    Oh, thats right..thanks carnivore1
     
    • Like Like x 1
  16. mitchellgilmore23

    Joined:
    15 Nov 2018
    Messages:
    52
    Likes Received:
    44
    • Like Like x 1
  17. venzelx

    venzelx Well-Known Member

    Joined:
    10 Nov 2018
    Messages:
    36
    Likes Received:
    28
    Hello everyone

    I've tried to capture every 4-way Handshake or PMKID possible in one capture file with this command :

    hcxdumptool -i wlan0mon --enable_status=3 -o gotchu.cap

    and its end up with one handshake and 2 PMKIDs

    so i want to know if we can crack every AP in that cap file in the same time with hashcat or no.

    btw this is the command to extract the PMKIDs from the cap file :

    hcxpcaptool -z <output file> <capture file>

    thanks
     

    Attached Files:

    • Like Like x 1
  18. mitchellgilmore23

    Joined:
    15 Nov 2018
    Messages:
    52
    Likes Received:
    44
    Absolutely. If you have multiple PMKID's (-m16800) put them in a txt file, 1 per line. Then where you would normally put the one PMKID, put the path to the txt file. If you have multiple .cap files, do cap2hccapx with hashcat-utils, then "cat <.cap file 1> <.cap file 2> <.cap file 3> > <path to .hccapx>. That will give you .cap 1, 2, and 3 in one .hccapx file. Then you can run -m 2500 with that one hccapx file and under the "Recovered" section you should see 0/3 or however many you have.
    --- Double Post Merged, 18 Dec 2018, Original Post Date: 18 Dec 2018 ---
    Also, the gotcha.cap file you posted does not contain a valid handshake.
     

    Attached Files:

    • Like Like x 2
  19. venzelx

    venzelx Well-Known Member

    Joined:
    10 Nov 2018
    Messages:
    36
    Likes Received:
    28
    Thank you

    Oh , Im sorry
    but when i run that command , i saw [Found Handshake], maybe cap2hccap can't recognize hcxpumptool captures file
     
    • Like Like x 1
  20. DadeMurphy

    DadeMurphy Member

    Joined:
    15 Dec 2018
    Messages:
    9
    Likes Received:
    9
    I think is 9 digts of numbers.
    I haven't use hashcat before. What I use is aircrack-ng.
    I tried to install hascat, but can't install using make/ make install/ sudo make install.
    Do you know what the problem is?
    [​IMG]
     
    • Like Like x 1

Share This Page

Loading...