Yes it is a new handshake, do not understand this password does not connect to the router. Am I capturing wrong? Many thanks again for helping me brother! --- Double Post Merged, 1 Nov 2019, Original Post Date: 1 Nov 2019 --- Well, I captured a lot of handshakes, and new ones. If now the password is the same, the neighbor won this fight. Hehe
Hi. I already tried the default wifite dictionary, rockyou dictionary and brute force with 8 digit numeric. its not likely the default password.its a huwaie router (maybe hg630 i am not sure though). WPS is disabled on this AP so cant use pixiedust on it. Its an indian AP. Will appreciate any input from you guys. gpuhashme found the password in 15 min if it helps
Hello, I captured this handshakes. I tried some dictionaries but no luck. Maybe some better German dictionary can do the job.
Thanks a lot man. since then i tried rockyou with best64 too. i am just curious as to what was your approach for cracking this and how much time it took you. Thanks in advanced man
A collection of real Wifi passwords from around the world. https://app.box.com/s/1l59ppph9ourv35phiy65u1vr1v0hje7 --- Double Post Merged, 11 Dec 2019, Original Post Date: 11 Dec 2019 --- Sorry, I couldn’t find out the passwords ( FRITZ! Really complex 20 digit passwords. The rest ended in failure.
the epidemic imprisoned us in our home. There are a few more lines. Thanks for everything... 0804c85853f497bc5315e712cd755f5c*3cdfbd6b1ca0*5c70a38eccf9*54544e45545f4847363330615f31433846 c02ff262d6feffa1e1e332730c2550eb*7c8bcae4000f*c8aacc2efb22*5a455954494e414e41 cf0c3bac2d6561ccfbdfc6cbbd2f3bd1*fc4ae91a0a17*b4e1eb803909*53414c4f4e20434c415353204d454e 2f778f3c8ff6423daafc0aa9a1152628*ec086bef44ae*f04f7c8944b0*5475726b54656c656b6f6d5f5434344145 130cccbd752029ccb93abdcb73903847*c47154d7eec6*b025aa3bb906*5475726b54656c656b6f6d5f5445454336 f22020c865c1eeae9539cf05fb7c4b6f*c47154d7eec6*641cb0ddea6d*5475726b54656c656b6f6d5f5445454336
ec086bef44ae:f04f7c8944b0:TurkTelekom_T44AE:2fm7a7X6 c47154d7eec6:b025aa3bb906:TurkTelekom_TEEC6:k5VD4ixE
Dude you are awesome. Could there be solutions for others? --- Double Post Merged, 3 Jun 2020, Original Post Date: 10 May 2020 --- 35dd1b932d3d21b88881c82f25366896*fc4ae91a0a17*6489f152ec67*53414c4f4e20434c415353204d454e b36acdb325980a178178e1a025c954ac*fc4ae91a0a17*54fcf0a21a15*53414c4f4e20434c415353204d454e 2e0d416f5389c759a5153f6e291e3a50*fc4ae91a0a17*6c006b764693*53414c4f4e20434c415353204d454e Thanks...
Hi, I had try my best but had no luck. Anyone willing to help me will be much appreciated. Your capture statistics: Access Points found: 1 Handshakes found: 14 Best handshake selected: ESSID.......: liliooi BSSID.......: 74A:88:7D:F2:9A (Tp-Link Technologies Co.,Ltd.) STMAC.......: C8:F2:30:C8:BE:03 (Guangdong Oppo Mobile Telecommunications Corp.,Ltd) Handshakes..: 14 Quality: 100% (excellent) liliooi (74A:88:7D:F2:9A <-> 88:32:9B:CD:1D:5F) liliooi (74A:88:7D:F2:9A <-> C8:F2:30:C8:BE:03) 11B4EE22F510E0FC001CF987932A4E2C HMAC_SHA1_AES M2+M3/M2, 4, 13.3ms, 1/2, auth, 100% BB8126A6FA20089C7AA5008B72A140DA HMAC_SHA1_AES M1+M2/M2, 2, 15.3ms, 1/1, !auth, 50% 11B4EE22F510E0FC001CF987932A4E2C HMAC_SHA1_AES M1+M2/M2, 4, 8.2ms, 1/1, !auth, 50% liliooi (74A:88:7D:F2:9A <-> 54:C9F1:47:7A) 8DA9BE5E3E08B8A6E828495898C90797 HMAC_SHA1_AES M1+M2/M2, 2, 7.2ms, 2/2, !auth, 50% 213AA059D744C1F17076A36BE3BC2A5E HMAC_SHA1_AES M1+M2/M2, 167, 1015.4ms, 1/2, !auth, 1% EC7283B926EC8422D2B51DCF3AABC49C HMAC_SHA1_AES M1+M2/M2, 2, 13.9ms, 2/2, !auth, 50% Thank you Sifu.
c2c16dea099dc0b5f403a14aeff0e315*fc4ae9af0dfe*7081eb277ad2*5455524b5341542d4b41424c4f4e45542d304446392d322e3447 b94f43e4b2168044e3a019759f3cdb1d*f80113271dd6*b407f9fa467c*54544e45545f4855415745495f31444335 c2c16dea099dc0b5f403a14aeff0e315*fc4ae9af0dfe*7081eb277ad2*5455524b5341542d4b41424c4f4e45542d304446392d322e3447 d202249cd68ea17c6d886141d12b21f5*802bf94ed467*c022500215b5*5455524b5341542d4b41424c4f4e45542d443436312d322e3447 I listed from important to unimportant. Thank you...