Well after about 5 days of working on these files i finally finished! Listed below are links to 356 hash files, these files can be used to crack NETGEARXX & MyCharterWiFiXX WPA/WPA2 handshakes. The files were made using pyrits database functions & the "export_cowpatty" command. I did multiple tests using these files with pyrit & cowpatty. They should work with other programs as well as long as they support cowpatty hash files. The hash files are populated with passwords that follow the adjective+noun+3d & adjective+noun+1d. Over 30 million passwords in each file! These files will significantly improve the speed of cracking your handshake! That is the purpose of these files. These files are meant to attack NETGEARXX & MyCharterWiFiXX handshakes. These files are useless when attacking other SSID's! ALL FILES ARE SSID SPECIFIC! NETGEARXX Links (100 SSID's) Code: Select All Download Link List in Attachments MyCharterWiFiXX Links (256 SSID's) Code: Select All Download Link List in Attachments Please Reply in thread or PM to report any dead links!
--- Double Post Merged, 8 Oct 2016, Original Post Date: 8 Oct 2016 --- Sure has been a lot of work put into this! Amazing. For those just discovering it, indycoltsfan84, has put together an amazing assortment of files for Charter & Netgear Routers. Windows users will be disappointed or even better still, properly challenged to have a go with the Linux Cowpatty and the Linux Pyrit programs. These are included in most versions of the virtual boot CD of Reaver, as standard. You will need to go to the console to call them up, after booting up Reaver from your CD drive.The trick then is to learn the Cowpatty & Pyrit command line actions. So why Cowpatty & Pyrit? Both use the time trade off method by being able to use pre computation method. PMK. Windows users may be familiar with the Rainbow method that is used with Rainbow tables for NTLM hash testing. Cowpatty & Pyrit similiarly uses pmk on cap files in a similiar way as an extra bonus for speeds are even faster, especially on GPU. The beauty of these tables is that members who have not done it before can practice using files of their choice, possibly on handshakes they have already done, to get an idea of things. I have downloaded two of indycoltfan84's, Netgear files. Each was 1.3ghz in size with the 7z zip file containing closer to 1.5ghz, containing one pmk file per SSID. Ready for Cowpatty or Pyrit. You can see the amount of work just on the Netgear files listed. 100 files at 1.3ghz. I was a little daunted by each size but the good news is the file site supports multiple downloads and you can use a downloader using the final link's button properties. Remember to omit the word Netgear*** from the end of the link given by indycoltfan84, so you can proceed. It's important the right SSID file is used, as the SSID is the seed to get the password. Stating just a little........ of the obvious in my post but hopefully it assist others on finding what its all this is about. We still need to keep a look out for even more words and contribute as best we can on the other thread. --- Double Post Merged, 15 Oct 2016 --- So at the risk of being red faced, could I have a bit of help regarding how to qualify the path statements when using Linux? Typically there is Cowpatty & Pyrit built into Xiaopan. In window$, I would put a drive letter say C:\ etc\ etc. In Xiaopan Linux, there is a root drive. Usually I save the handshake to a USB flash drive, which I have already mounted using the mounting icon. In the console, I am aware of the correct Cowpatty & Pyrit commandline commands. Assuming the console knows about Cowpatty & Pyrit already (? - do I need to tell it) , what is the way to tell these two programs in Xiaopan to read (a) my handshake and (b) to read my Genpmk file from the usb flash drive. I am assuming Cowpatty & Pyrit are not mind readers and that I need to point the structure toward the flash drive so everything can proceed. Seems to be lots of tuts for Backtrack, Kali etc but not Xiaopan. Basic help & example appreciated. Mainly the understanding of pointing the path to my 8GB USB flash drive.
You will need need to specify the path to both files. A quick to test to see if cowpatty & pyrit are installed is to simply type "cowpatty" or "pyrit" in your console --- Double Post Merged, 15 Oct 2016, Original Post Date: 15 Oct 2016 --- A quick example would be cowpatty -r path to handshake -d path to hash file -s network SSID if path to either file contains any spaces, you will need to wrap it inside quotes "path to file"
hello, does anyone have a copy of these? I dont have a strong computer and would like to use this thanks
These are probably out of date by now, try this thread instead: https://xiaopan.co/forums/downloads/netgearxx-wordlist-by-gearjunkie.415/ It only took about an hour to go through the list on my Linux pc in aircrack. It didn't find mine, but it does seem to work for a lot of other people. --- Double Post Merged, 21 Apr 2018, Original Post Date: 20 Apr 2018 --- sorry it took about a few hours, I confused that with my area-code based crunch list that took about an hour with a preset+7 random numbers. I ran them off the cpu though but I guess hashcat would be quicker.