You must not be trying too hard to crack these..they take like 20 seconds...... 5ab42203824f:347c254f6517:SpectrumSetup-51:valleyfinish841 carnivore1
Hey guys! Hope you're all doing okay. I cracked a few networks that had some more new words. (I added them to the spreadsheet) Sagecom: proudbread646 adorableship265 Askey: errandnest835
Have 8 here if someone wants to have a crack at them: 2511b24311e15a8f40a4a09d63d49cd9:9c3dcf73cdfe:b0febdb7b22a:4e4554474541523238 49fc73b336ae311272bd7a7d9fdf3624:9c3dcf1a8e40:b0febdb7b22a:4e5447525f564d425f31353136333232333235 7e35eb7377f11cd619edc88293800340:9c3dcf91543f:b0febdb7b22a:4e4554474541523039 af541c0d46f194e1dfb322ea0ca3ad65:9c3dcf91543f:c0f8da7ff41b:4e4554474541523039 cf3ecb72f23b4884556981a7e0e00e9a:9c3dcf73cdfe:c02250cadeb2:4e4554474541523238 d964693a68e2394da849093edafc3940:9c3dcf1a8e40:c02250cadeb2:4e5447525f564d425f31353136333232333235 ed9f8b8e8984f8f1494a7de21e7b67cb:9c3dcf7561e2:b0febdb7b22a:4e4554474541523835 ff36c1d730c1493043a772033d84fc6f:a040a07e63ea:b0febdb7b22a:4e4554474541523739
Yes, 16800 Copy them all into a text file 16800.txt and then run like this: hashcat -m 16800 16800.txt -w 3 -a 6 yourNGfile.txt ?d?d?d --- Double Post Merged, 13 Sep 2020, Original Post Date: 13 Sep 2020 --- Warning though, these one's are tough! I haven't been able to get them with my lists.
I'm running all the ones from the wordlist forum. Are these 8 the ones you couldn't crack with our regular lists?
Just chiming in to say that I had one password of enoughnumber109 come up on a router and didn't see 'enough' on the adj list
Thank you so much! I'll add it to the spreadsheet. Do you happen to know the model number or first 6 digits of the mac address of that router? --- Double Post Merged, 15 Sep 2020, Original Post Date: 14 Sep 2020 --- Found 2 more new words for the spreadsheet Askey yachtheight572 Arris honestcheek235
petrovivo1234 thank you so much. --- Double Post Merged, 27 Sep 2020, Original Post Date: 19 Sep 2020 --- found another one if someone could help.
Although this is not on topic, I would like to introduce it into the forum. It has a big bearing on how we all move forward. And the subject is WPA3. For those that dont know, WPA3 does not readily reveal its hash across the air. Last year it was approved for use by the international IT community and regulators. On the plus side, it will be slow to intoduce because of backward capability. ie Routers, computers and phones before 2019 will have trouble. So there is breathing space for a short time. I propose this post being moved by admin to a new branch of the site. I also propose to the community a successor to Beini & Xiaopan, another live CD, a generation 3 CD as it were that can do easily man in the middle & evil twin methods. Again in Live CD Linux but without the clutter of Backtrack/Kali. The biggest advantage of Beini & Xiaopan has been its GUI, a collection of small interfaces to help people away from CLI - command line interface. Xiaopan is still Linux but with a friendly interface. minidwep & inflator are the two main examples. Are there any good GUI inserts for Linux that could assist in building a live Linux CD to do Man in the middle (MIM) & Evil Twin (ET) with a simple interface, I wonder. Greets to all and massive respect. Apologies for off topic but considering the high talent here, thought I should post. Maybe admins can kick this post to its own thread. Thanks again for reading and again total respect. Just think we should be getting ready... Regards, Garry.
I've tried a few of the Netgear/Spectrum dictionaries but no luck. Could someone please try to give this one as shot?
Thanks for the heads-up! I'm sure a lot of us on here have read the same thing about WPA3 and how it works. Yes, our current methods will not work on that standard as is but there may be other possible exploits in the future as with all security measures. For example, we even recently found out about a relatively new pmkid exploit that lets us crack a network without having to rely on clients for the handshakes. This thread is about breaking these specific isp router/modems that have been given out for years, are still being given out for the foreseeable future. They will not change to become a WPA3 over the air so they will have the same vulnerabilities, and most importantly will be in use by countless people across the country for YEARS to come. I still see the older, easier to break routers isps gave out almost a decade ago all the time, which goes to show that people don't bother upgrading their hardware unless it's absolutely necessary. Will ISPs use more secure WPA3 routers in the future? Yes, of course! And we'll cross that bridge together when that happens, probably with that router having it's own thread on this site. We may not see any useful exploits until actual units are released to the markets and broadly used, so talking about them right now is still pretty pointless. Most importantly, some unknown future transition to a WPA3 model doesn't change the sheer presence of these current ISP routers and their existence in the wild for years to come.