Dears, i have this Technicolor WPA-Hash 22000 im trying to to crack it , i have only cpu on my laptop and i can't try bigger word lists . I tried 8 digit brute force and rockyou.txt, human4.dic but failed. I am not sure if it is still a standard password Technicolor-[0-9A-F][len10] or a human password? Edit: or is it this? Tech_XXXXXXXX - [A-Z] Len: 8? I uploaded to gpuhash and it got cracked with Basic search in less than 15 mins. I don't have BTC and very hard to get it. Please help me with this WPA-Hash. Type: WPA/WPA2 HASH ESSID: Tech_D0056593 BSSID: 08:95:2A:89:F7:78 (Technicolor CH USA Inc.) Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL) WPA*01*7fdb9bfbacd8a7f4539df843757635e4*08952a89f778*ce191e7b3b6a*546563685f4430303536353933*** Thanks so much! --- Double Post Merged, 6 Nov 2021, Original Post Date: 5 Nov 2021 --- Enclosed is the handshake if you prefer to work with it. --- Double Post Merged, 14 Dec 2021 --- OK, I finally managed to crack the hash myself, I don't know how many days it took exactly, because I had several attempts. The mask ?u?u?u?u?u?u?u?u then led to success. 7fdb9bfbacd8a7f4539df843757635e4:08952a89f778:ce191e7b3b6a:Tech_D0056593:PHXPYDMT So it was n fact Tech_XXXXXXXX - [A-Z] Len: 8
Yes, that's right, I was still in the throes of success. Of course it was ?u?u?u?u?u?u?u?u I still have a tech_ here, so I'll start the first job with Z and then work my way back. So Z?u?u?u?u?u?u?u This should be a bit faster if the first position starts with a back letter. --- Double Post Merged, 14 Dec 2021, Original Post Date: 14 Dec 2021 --- Theoretically, the reducer should also work since it also shortens the time. Since also like UPCXXXXX-[A-Z][len8] I would test this again with my hash and with the first letter P. So e.g. ua -upper -startswithP | hashcat -m 22000 -w 3 It shouldn't take that long. https://github.com/wpatoolkit/Upper-Alpha-Keyspace-Reducer --- Double Post Merged, 14 Dec 2021 --- OK that worked fine. per .bat @echo off ua -upper -noio -7minuniques -startswithP | hashcat -m 22000 -w 2 --force --status --status-timer=60 -p : --hwmon-temp-abort=80 -d 1 -o "D:\WLAN\cracked.txt" --outfile-format=1,2 TechD0056593.hc22000 @pause Session..........: hashcat Status...........: Cracked Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL) Hash.Target......: TechD0056593.hc22000 Time.Started.....: Tue Dec 14 04:11:38 2021, (1 hour, 20 mins) Time.Estimated...: Tue Dec 14 05:32:22 2021, (0 secs) Kernel.Feature...: Pure Kernel Guess.Base.......: Pipe Speed.#1.........: 171.0 kH/s (12.15ms) @ Accel:4 Loops:256 Thr:512 Vec:1 Recovered........: 1/1 (100.00%) Digests Progress.........: 836485120 Rejected.........: 0 Restore.Point....: 0 Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1 Candidate.Engine.: Device Generator Candidates.#1....: PHXPRZCP -> PHXPZBXG Hardware.Mon.#1..: Temp: 68c Util: 41% Core:1655MHz Mem:6794MHz Bus:16 Started: Tue Dec 14 04:11:36 2021 Stopped: Tue Dec 14 05:32:22 2021