I'll pay 0.0004 Bitcoin for someone to crack this handshake... for some reason GPUHash will not approve it... And I have tried the handshake, the pmkid, I've tried under different app addresses, and uploaded different captures, It's weird. Anyways, If cracked in <1 hr then I'll send 0.0008 bitcoin, else 0.0004. Thanks! ESSID: ATTby4Xti2 Cap files: Either of the *****D0_39_B3_58_78_F0.cap Thanks!!! --- Double Post Merged, 28 Aug 2020, Original Post Date: 28 Aug 2020 --- Oh, and if anyone can crack ANY of these others, I'll pay $20 worth of bitcoin EACH..... --- Double Post Merged, 31 Aug 2020 --- Okay, $40 for the password for ATTby4Xti2 located inside ****D0_39_B3_58_78_F0.cap files. Bitcoin
19ed547e5a0e117ec020ed29c6eb2dec*001c7bf56b7d*60ab67ba1a74*4e65744d415354455220557964756e65742d42313334 489d42e70238278936a6916a5b6631fd*082697c67137*54b802df4822*5475726b54656c656b6f6d5f5a34563956 I had to sell my graphics card. I can't bruteforce. 8 digits lowercase 29 letters alfabetic character and number Thanks...
Anyone can help me for these 2 handshake files? Much appreciated. 1. Best handshake selected: ESSID.......: 256 BSSID.......: 74A:88:34:E9:A8 (Tp-Link Technologies Co.,Ltd.) STMAC.......: 84:B5:41:AB:29:AE (Samsung Electronics Co.,Ltd) Handshakes..: 2 Quality: 100% (excellent) 256 (74A:88:34:E9:A8 <-> 08:78:08:0A:EC:AC) 256 (74A:88:34:E9:A8 <-> 84:B5:41:AB:29:AE) 0B4D6625D1A8BCB06D97B6182AFC7327 HMAC_SHA1_AES M1+M2/M2, 4, 8.2ms, 0/0, !auth, 50% 0B4D6625D1A8BCB06D97B6182AFC7327 HMAC_SHA1_AES M2+M3/M2, 2, 8.7ms, 0/1, auth, 100% 2. ESSID.......: ezviz_686DBC845F8D BSSID.......: 44:B2:95:F8:56:69 (Sichuan AI-Link Technology Co., Ltd.) STMAC.......: D4:B7:61:6C:38:3F (Sichuan AI-Link Technology Co., Ltd.) MIC.........: 08152C1D8A8A56DABED76980B5236E1E MIC.........: CCC0A46CEBA08F8160029F4FA11D00E2 Handshakes..: 2 (1 authenticated) --- Double Post Merged, 15 Sep 2020, Original Post Date: 14 Sep 2020 --- Both passwords were not able to find at Login or Signup to view links / downloads for a basic search. No luck. 1. Type: WPA/WPA2 EAPOL ESSID: 256 BSSID: 74A:88:34:E9:A8 (Tp-Link Technologies Co.,Ltd.) STMAC: 84:B5:41:AB:29:AE (Samsung Electronics Co.,Ltd) MIC: 0B4D6625D1A8BCB06D97B6182AFC7327 Attack configuration: Basic search Priority: 0 Hide my ass: N Recorded: 2020-09-14 15:02:11 Started: 2020-09-14 17:17:01 Finished: 2020-09-14 18:02:22 (45 min) Status: Completed PASSWORD NOT FOUND 2. Type: WPA/WPA2 EAPOL ESSID: ezviz_686DBC845F8D BSSID: 44:B2:95:F8:56:69 (Sichuan AI-Link Technology Co., Ltd.) STMAC: D4:B7:61:6C:38:3F (Sichuan AI-Link Technology Co., Ltd.) MIC: CCC0A46CEBA08F8160029F4FA11D00E2 MIC: 08152C1D8A8A56DABED76980B5236E1E Attack configuration: Basic search Priority: 0 Hide my ass: N Recorded: 2020-09-15 01:06:21 Started: 2020-09-15 13:54:40 Finished: 2020-09-15 14:09:16 (< 15 min) Status: Completed PASSWORD NOT FOUND --- Double Post Merged, 12 Oct 2020 --- Anyone can help me with this handshake files? Much appreciated. Type: WPA/WPA2 EAPOL ESSID: Nee5132@unifi BSSID: CC:4F:5C:A2:78:60 STMAC: 84:11:9E:03:3F:EA (Samsung Electronics Co.,Ltd) MIC: 3BC5589F8970520AB8D7A4F933638116 Attack configuration: Basic search Priority: 0 Hide my ass: N Recorded: 2020-10-12 07:15:50 Started: 2020-10-12 08:17:36 Finished: 2020-10-12 08:35:56 (18 min) Status: Completed
Hi everyone, I have already tried pretty much any website with dictionaries and I'm working on this since like two weeks but I have not found the Digest yet. If anyone would be able to help me find it out in a decent amount of time I would be glad, unfortunately my VGA will take more than a month to complete the bruteforce... WPA*02*9ec88e165b304c0810ad23664378f5d0*30918fd46575*74428ba878df*464153545745422d312d443436353735*7a666104bcdd51dce35676411d5a8d4 3bf2c2f82244a12c5fa4d877350ae5b2a*0203007502010a00100000000000000001997c58be3ef28858faa60dfdc6ccf98a0e7f6175a3861e87de47a62ebc7941 52000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001630140100000fac020100000fac04 0100000fac020c00*02 This is a technicolor router, so the default password's pattern should be 0-9 a-f A-F I guess. I will continue bruteforcing anyway, hoping to be lucky. Thanks in advance for your time.
You are right, I didn't even think to check that online. Thanks for the hint mate, luckily I was already working on the uppercase only.
WPA*01*b35a01b220fe7a51f478158ce407c3d2*fc4ae9381eb3*acde487dd26d*4973656c6c65646d7972747832303630666f72505335*** I have only this line left. Help please...
Hi. I already tried the default wifite dictionary, rockyou dictionary and brute force with 8 digit numeric. its not likely the default password. Will appreciate any input from you guys. gpuhashme found the password in 15 min if it helps. thanks
Your captures are 5 months old. Try to keep more recent as the passwords might have been changed. 302303d46149:1c5cf28e37aa:SAUD-V:053299721
thank you thank you thank you i was knocking my head for the past five months to crack this thing but you did it in one night well at lest i learn some of the biscuits....
Hi guys. I have tried rock you. 8digit all numerics. and bunch of other dictionaries( about 2gb worth) but couldnt crack it. any help will be appreciated guys.