Already tried 8 digit, no work

Discussion in 'Dictionary, Password & Wordlists' started by xsprint, 18 Apr 2024.

  1. xsprint

    xsprint Member

    Joined:
    17 Apr 2024
    Messages:
    7
    Likes Received:
    2
    Here is a recent .cap, tried 8 digit and hashcat returned 100% .

    I am currently testing the limits of the machine, and knowing the right answer will redirect my path towards learning.

    Thanks in advance. Peace.
    --- Double Post Merged, 18 Apr 2024, Original Post Date: 18 Apr 2024 ---
    Session..........: hashcat
    Status...........: Exhausted
    Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL)
    Hash.Target......: psk-2.hc22000
    Time.Started.....: Wed Apr 17 23:35:40 2024 (58 mins, 41 secs)
    Time.Estimated...: Thu Apr 18 00:34:21 2024 (0 secs)
    Kernel.Feature...: Pure Kernel
    Guess.Base.......: File (8digit.txt)
    Guess.Queue......: 1/1 (100.00%)
    Speed.#1.........: 9806 H/s (19.43ms) @ Accel:64 Loops:64 Thr:64 Vec:1
    Speed.#2.........: 18727 H/s (9.25ms) @ Accel:256 Loops:256 Thr:1 Vec:8
    Speed.#*.........: 28533 H/s
    Recovered........: 0/2 (0.00%) Digests (total), 0/2 (0.00%) Digests (new)
    Progress.........: 111111110/111111110 (100.00%)
    Rejected.........: 11111110/111111110 (10.00%)
    Restore.Point....: 109290752/111111110 (98.36%)
    Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:1-3
    Restore.Sub.#2...: Salt:0 Amplifier:0-1 Iteration:1-3
    Candidate.Engine.: Device Generator
    Candidates.#1....: 99997696 -> 99999999
    Candidates.#2....: 99994624 -> 99997695
    Hardware.Mon.#1..: Util: 56% Core: 400MHz Mem:1200MHz Bus:16
    Hardware.Mon.#2..: N/A

    Started: Wed Apr 17 23:35:28 2024
    Stopped: Thu Apr 18 00:34:23 2024
     

    Attached Files:

  2. petrovivo1234

    petrovivo1234 Well-Known Member
    VIP

    Joined:
    19 May 2018
    Messages:
    450
    Likes Received:
    537
    c46e1f77931a:361c69179280:ARTHUR_MHNET:ange5870
     
    • Like Like x 1
    • Friendly Friendly x 1
  3. xsprint

    xsprint Member

    Joined:
    17 Apr 2024
    Messages:
    7
    Likes Received:
    2
    hack 'em all, thanks petrovivo. I used a numeric only list.

    Curiosity: does this router has the same vulnerability that those NETGEAR where the necessity is to search for 3 ?l?l?l, because there is already "fixed" parameters?
    --- Double Post Merged, 18 Apr 2024, Original Post Date: 18 Apr 2024 ---
    cojovi said:
    holy cow thats not only impressive but that was fast! just for curiosity, as far as the cracking is concerned is it 95% about the quality of the word list? im just try ing to diagnose what i did wrong or not adequate enought to be able to crack it myself.. again thanks alexb !
    With Spectrum (and some netgrear) routers then it's all about the wordlist as they use the following format for their default passwords: adjective + noun + ddd
    You can down the netgear-spectrum.txt wordlist which has about 90% of the known adj+noun combinations here: https://github.com/soxrok2212/PSKracker/tree/master/dicts/netgear-spectrum, then just add ?d?d?d when attempting to crack.
    hashcat format: hashcat -m 22000 hash.txt -a6 netgear-spectrum.txt ?d?d?d

    #1357 alexb, 6 May 2023

    https://xiaopan.co/forums/threads/netgearxx-wordlist.6571/page-68
     

Share This Page

Loading...