Hello guys and girls . I also have two wpa handshakes , if anyone is willing to help me, crack this. I know that this ones have password of 8 characters : lowercase letters and digits. The modem it's huawei - fiber home technolgies used by a romanian ISP : RCS-DCS , DIGI Thanks in advance!
For starters, both have malformed packets with the broadcast message. Second i would also like m1,m2,m3 and the broadcast message please. Can you recapture? Are you using wifi-autopwner ?
Hi, Yes. I am using wifi-autopwner. Also i was trying with fluxion . Can you tell me how to capture good wpa handshakes ? Thanks ! PS: i have tried to get another handshake for the other network but i now use a tool from wifislax distribution In gpuhash.me it say that it's say "100% excellent"
Hi man, I did upload it there because I want it to verify if it is a good hash. Not for paying them to crack it . I don't know where to check in other places on the internet. And to be honest , i didn't try to search on google. If you want , maybe you could help me with that hash . Thanks
Ok then, i will take your word for it. Since you have been a member here for so long I get a little cranky some times I'll take a look at it for you
Just spent 2 hours running wordlists - no luck As for running 8x lowercase and digits , click on the picture below. 81 days is too long to wait I'm trying some more lists.
To much time for this . I guess i have to try more with evil twin. Even if it is something strange with it. In AP authenticator appear clients online but no attempts made even if the clients are getting disconnected very aggressively ..... Probably i have to find another application, instead of evil twin --- Double Post Merged, 27 Feb 2021, Original Post Date: 26 Feb 2021 --- Today i realize that the password is formed by lowercase and hexadecimal : 8 characters , 0-9 and letters a-f
please there is only one pmkid and handshake file. Can you try with 8 character and number set? WPA*01*e931350f30b6b74763c420f31cb832c8*5c63bfd9e9a9*e0cb1dffc194*5475726b54656c656b6f6d5f5430374535***
Hi. I already tried the default wifite dictionary, rockyou dictionary and brute force with 8 digit numeric. its not likely the default password. Will appreciate any input from you guys. thanks