Session..........: hashcat Status...........: Exhausted Hash.Name........: WPA-EAPOL-PBKDF2 Hash.Target......: 1.hccapx Time.Started.....: Thu Mar 04 13:40:12 2021 (8 mins, 21 secs) Time.Estimated...: Thu Mar 04 13:48:33 2021 (0 secs) Guess.Mask.......: 01?1?d?d?d?d?d?d?d?d [11] Guess.Charset....: -1 0125, -2 Undefined, -3 Undefined, -4 Undefined Session..........: hashcat Status...........: Exhausted Hash.Name........: WPA-EAPOL-PBKDF2 Hash.Target......: 1.hccapx Time.Started.....: Thu Mar 04 13:48:54 2021 (51 secs) Time.Estimated...: Thu Mar 04 13:49:45 2021 (0 secs) Guess.Mask.......: 01?1?d?d?d?d?d?d?d [10] Guess.Charset....: -1 0125, -2 Undefined, -3 Undefined, -4 Undefined Session..........: hashcat Status...........: Exhausted Hash.Name........: WPA-EAPOL-PBKDF2 Hash.Target......: 1.hccapx Time.Started.....: Thu Mar 04 13:50:07 2021 (8 mins, 21 secs) Time.Estimated...: Thu Mar 04 13:58:28 2021 (0 secs) Guess.Mask.......: 1?1?d?d?d?d?d?d?d?d [10] Session..........: hashcat Status...........: Exhausted Hash.Name........: WPA-EAPOL-PBKDF2 Hash.Target......: 1.hccapx Time.Started.....: Thu Mar 04 14:51:02 2021 (50 secs) Time.Estimated...: Thu Mar 04 14:51:52 2021 (0 secs) Guess.Mask.......: 1?1?d?d?d?d?d?d?d [9] Guess.Charset....: -1 0125, -2 Undefined, -3 Undefined, -4 Undefined Session..........: hashcat Status...........: Exhausted Hash.Name........: WPA-EAPOL-PBKDF2 Hash.Target......: 1.hccapx Time.Started.....: Thu Mar 04 14:54:01 2021 (2 mins, 14 secs) Time.Estimated...: Thu Mar 04 14:56:15 2021 (0 secs) Guess.Mask.......: ?d?d?d?d?d?d?d?d [8] Session..........: hashcat Status...........: Exhausted Hash.Name........: WPA-EAPOL-PBKDF2 Hash.Target......: 1.hccapx Time.Started.....: Thu Mar 04 15:01:13 2021 (21 secs) Time.Estimated...: Thu Mar 04 15:01:34 2021 (0 secs) Guess.Base.......: File (rockyou.txt) Session..........: hashcat Status...........: Exhausted Hash.Name........: WPA-EAPOL-PBKDF2 Hash.Target......: 1.hccapx Time.Started.....: Thu Mar 04 15:02:05 2021 (1 min, 39 secs) Time.Estimated...: Thu Mar 04 15:03:44 2021 (0 secs) Guess.Base.......: File (rockyoubig.txt)
ESSID : mostafa BSSID: c8-0c-c8-3b-01-dc Phone number formats: 011xxxxxxxx , 010xxxxxxxx , 012xxxxxxxx , 015xxxxxxxx Country of Origin: Egypt
ESSID : chucky BSSID: d0-7a-b5-29-0a-4a Country of Origin: Turkey ESSID : Karabüyü BSSID: 5c-63-bf-79-29-fe Country of Origin: Turkey
ESSID : Vodafone1815 BSSID: E4-0E-EE-B2-18-15 ISP: Vodafone Phone number formats: 011xxxxxxxx , 010xxxxxxxx , 012xxxxxxxx , 015xxxxxxxx Country of Origin: Egypt
Hello hashkillers I've got a wpa handshake and I tried a few dictionaries like rockyou, all common, all 8 numeric - not found. I think the password is in this format like this : CP1BNLG8FET4 - 12 chars, alpha upper and digits. It is crackable for you or we need to wait until next Big Bang?
I did a check kind of like this before, but for lower alpha. Same times: Lower alpha only, 12 digits: Time.Started.....: Wed Mar 03 17:39:03 2021 (4 secs) Time.Estimated...: Next Big Bang (> 10 years) Guess.Mask.......: ?l?l?l?l?l?l?l?l?l?l?l?l [12] Guess.Queue......: 1/1 (100.00%) Speed.#1.........: 536.0 kH/s (75.81ms) @ Accel:512 Loops:256 Thr:64 Vec:1 Speed.#2.........: 536.0 kH/s (75.82ms) @ Accel:512 Loops:256 Thr:64 Vec:1 Speed.#3.........: 545.4 kH/s (74.10ms) @ Accel:256 Loops:512 Thr:64 Vec:1 Speed.#*.........: 1617.3 kH/s alphaneumaric would be a LOT longer. Now if you are referring to: ?h = 0123456789abcdef Time.Started.....: Wed Mar 03 17:42:55 2021 (2 secs) Time.Estimated...: Fri Sep 11 13:08:21 2026 (5 years, 191 days) Guess.Mask.......: ?h?h?h?h?h?h?h?h?h?h?h?h [12] Guess.Queue......: 1/1 (100.00%) Speed.#1.........: 534.5 kH/s (75.85ms) @ Accel:512 Loops:256 Thr:64 Vec:1 Speed.#2.........: 534.0 kH/s (75.91ms) @ Accel:512 Loops:256 Thr:64 Vec:1 Speed.#3.........: 546.1 kH/s (73.86ms) @ Accel:512 Loops:256 Thr:64 Vec:1 Speed.#*.........: 1614.6 kH/s