Ja, ich habe es auch herausgefunden, also hat https://www.onlinehashcrack.com/ es für mich getan. Wie haben Sie es herausgefunden? Haben Sie gedacht, Sie würden alle Zahlen von 0 bis 9 und acht Ziffern ausprobieren? Ich brauche 3 Stunden, um alle Kombinationen zu machen. Ich habe gestern auch daran gedacht, es zu versuchen, aber dann dachte ich, Android ap hat standardmäßig Buchstaben und Zahlen, also versuche ich nicht einmal Zahlen. And thx for you help
10da43df54b6:28ad3efdd5be:NETGEAR97:freeplanet172 Session..........: hashcat Status...........: Cracked Hash.Name........: WPA-EAPOL-PBKDF2 Hash.Target......: NETGEAR97 (AP:10:da:43:df:54:b6 STA:28:ad:3e:fd:d5:be) Time.Started.....: Wed Oct 14 10:25:00 2020 (13 secs) Time.Estimated...: Wed Oct 14 10:25:13 2020 (0 secs)
Hash.Target......: FASTWEB-1-5kZmQmRtu1EW_EXT (AP:a4:2b:8c:04:19:fa STA:6c:ad:f8:b9:80:77) Pretty sure they do not follow the standard netgear keyspaces.
Didn't pop with the regular NG list. --- Double Post Merged, 21 Oct 2020, Original Post Date: 21 Oct 2020 --- Or the Askey list. --- Double Post Merged, 21 Oct 2020 --- a42b8c0419fa:6cadf8b98077:FASTWEB-1-5kZmQmRtu1EW_EXT:evolva56
209a7d14c5f6:a47733144b10:SpectrumSetup-F0:easylemon091 209a7d14c5f6:a47733144b10:SpectrumSetup-F0:easylemon091
Could I get a sanity check here? Ran this against the old dictionary then tried piping "hcxpsktool --netgear" and "hcxpsktool --askeyarris" to hashcat. No dice.
lol I'm conflicted. It's nice to see its still a vendor password but I'm bummed none of my wordlists had it. Did you use a anti-vendor wordlist or a much larger generalist one?
I've been picking up new words over several of the forums and them adding them to the known list. There is a pretty solid start a couple of pages back.
5ab422ac443f:eaa76279b81d:SpectrumSetup-41:rewardbarrel054 94917f7b14c1:4c66417f90cf:MySpectrumWiFic3-2G:benchkettle530
Could someone help me with this one, please? The file extension is really .22000 so please rename from .txt after download. Have a great weekend