I'll pay 0.0004 Bitcoin for someone to crack this handshake... for some reason GPUHash will not approve it... And I have tried the handshake, the pmkid, I've tried under different app addresses, and uploaded different captures, It's weird. Anyways, If cracked in <1 hr then I'll send 0.0008 bitcoin, else 0.0004. Thanks! ESSID: ATTby4Xti2 Cap files: Either of the *****D0_39_B3_58_78_F0.cap Thanks!!! --- Double Post Merged, 28 Aug 2020, Original Post Date: 28 Aug 2020 --- Oh, and if anyone can crack ANY of these others, I'll pay $20 worth of bitcoin EACH..... --- Double Post Merged, 31 Aug 2020 --- Okay, $40 for the password for ATTby4Xti2 located inside ****D0_39_B3_58_78_F0.cap files. Bitcoin
19ed547e5a0e117ec020ed29c6eb2dec*001c7bf56b7d*60ab67ba1a74*4e65744d415354455220557964756e65742d42313334 489d42e70238278936a6916a5b6631fd*082697c67137*54b802df4822*5475726b54656c656b6f6d5f5a34563956 I had to sell my graphics card. I can't bruteforce. 8 digits lowercase 29 letters alfabetic character and number Thanks...
Anyone can help me for these 2 handshake files? Much appreciated. 1. Best handshake selected: ESSID.......: 256 BSSID.......: 74A:88:34:E9:A8 (Tp-Link Technologies Co.,Ltd.) STMAC.......: 84:B5:41:AB:29:AE (Samsung Electronics Co.,Ltd) Handshakes..: 2 Quality: 100% (excellent) 256 (74A:88:34:E9:A8 <-> 08:78:08:0A:EC:AC) 256 (74A:88:34:E9:A8 <-> 84:B5:41:AB:29:AE) 0B4D6625D1A8BCB06D97B6182AFC7327 HMAC_SHA1_AES M1+M2/M2, 4, 8.2ms, 0/0, !auth, 50% 0B4D6625D1A8BCB06D97B6182AFC7327 HMAC_SHA1_AES M2+M3/M2, 2, 8.7ms, 0/1, auth, 100% 2. ESSID.......: ezviz_686DBC845F8D BSSID.......: 44:B2:95:F8:56:69 (Sichuan AI-Link Technology Co., Ltd.) STMAC.......: D4:B7:61:6C:38:3F (Sichuan AI-Link Technology Co., Ltd.) MIC.........: 08152C1D8A8A56DABED76980B5236E1E MIC.........: CCC0A46CEBA08F8160029F4FA11D00E2 Handshakes..: 2 (1 authenticated) --- Double Post Merged, 15 Sep 2020, Original Post Date: 14 Sep 2020 --- Both passwords were not able to find at https://gpuhash.me/ for a basic search. No luck. 1. Type: WPA/WPA2 EAPOL ESSID: 256 BSSID: 74A:88:34:E9:A8 (Tp-Link Technologies Co.,Ltd.) STMAC: 84:B5:41:AB:29:AE (Samsung Electronics Co.,Ltd) MIC: 0B4D6625D1A8BCB06D97B6182AFC7327 Attack configuration: Basic search Priority: 0 Hide my ass: N Recorded: 2020-09-14 15:02:11 Started: 2020-09-14 17:17:01 Finished: 2020-09-14 18:02:22 (45 min) Status: Completed PASSWORD NOT FOUND 2. Type: WPA/WPA2 EAPOL ESSID: ezviz_686DBC845F8D BSSID: 44:B2:95:F8:56:69 (Sichuan AI-Link Technology Co., Ltd.) STMAC: D4:B7:61:6C:38:3F (Sichuan AI-Link Technology Co., Ltd.) MIC: CCC0A46CEBA08F8160029F4FA11D00E2 MIC: 08152C1D8A8A56DABED76980B5236E1E Attack configuration: Basic search Priority: 0 Hide my ass: N Recorded: 2020-09-15 01:06:21 Started: 2020-09-15 13:54:40 Finished: 2020-09-15 14:09:16 (< 15 min) Status: Completed PASSWORD NOT FOUND --- Double Post Merged, 12 Oct 2020 --- Anyone can help me with this handshake files? Much appreciated. Type: WPA/WPA2 EAPOL ESSID: Nee5132@unifi BSSID: CC:4F:5C:A2:78:60 STMAC: 84:11:9E:03:3F:EA (Samsung Electronics Co.,Ltd) MIC: 3BC5589F8970520AB8D7A4F933638116 Attack configuration: Basic search Priority: 0 Hide my ass: N Recorded: 2020-10-12 07:15:50 Started: 2020-10-12 08:17:36 Finished: 2020-10-12 08:35:56 (18 min) Status: Completed
Hi everyone, I have already tried pretty much any website with dictionaries and I'm working on this since like two weeks but I have not found the Digest yet. If anyone would be able to help me find it out in a decent amount of time I would be glad, unfortunately my VGA will take more than a month to complete the bruteforce... WPA*02*9ec88e165b304c0810ad23664378f5d0*30918fd46575*74428ba878df*464153545745422d312d443436353735*7a666104bcdd51dce35676411d5a8d4 3bf2c2f82244a12c5fa4d877350ae5b2a*0203007502010a00100000000000000001997c58be3ef28858faa60dfdc6ccf98a0e7f6175a3861e87de47a62ebc7941 52000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001630140100000fac020100000fac04 0100000fac020c00*02 This is a technicolor router, so the default password's pattern should be 0-9 a-f A-F I guess. I will continue bruteforcing anyway, hoping to be lucky. Thanks in advance for your time.
You are right, I didn't even think to check that online. Thanks for the hint mate, luckily I was already working on the uppercase only.
WPA*01*b35a01b220fe7a51f478158ce407c3d2*fc4ae9381eb3*acde487dd26d*4973656c6c65646d7972747832303630666f72505335*** I have only this line left. Help please...
Hi. I already tried the default wifite dictionary, rockyou dictionary and brute force with 8 digit numeric. its not likely the default password. Will appreciate any input from you guys. gpuhashme found the password in 15 min if it helps. thanks
Your captures are 5 months old. Try to keep more recent as the passwords might have been changed. 302303d46149:1c5cf28e37aa:SAUD-V:053299721
thank you thank you thank you i was knocking my head for the past five months to crack this thing but you did it in one night well at lest i learn some of the biscuits....
Hi guys. I have tried rock you. 8digit all numerics. and bunch of other dictionaries( about 2gb worth) but couldnt crack it. any help will be appreciated guys.
hello,can anyone help me with this 2 handshakes,i am unable to crack them;i would really apreciate it!Thanks in advance! I would be more than happy to pay for that service also if someone manages to do it,1i hope i don t break any rules by mentioning that,if that is the case just dont consider the second part of my request