gpuhashme cracked in under 15 minutes

Discussion in 'Community Services' started by ilyas110298, 12 Nov 2020.

  1. ilyas110298

    ilyas110298 Member

    Joined:
    12 Nov 2020
    Messages:
    2
    Likes Received:
    0
    Hey guys,

    gpuhash.me basic research has cracked this wpa2 handshake in under 15 minutes, I tried word lists and brute force but nothing.

    All I know is that the old password for this essid: Belbo was "987654321@"

    Can someone please help.

    Thankies :)
     

    Attached Files:

  2. petrovivo1234

    petrovivo1234 Well-Known Member
    VIP

    Joined:
    19 May 2018
    Messages:
    236
    Likes Received:
    250
    0cb6d2c995f9:3c576c7997a4:Belbo:robocop82

    Please next time post your handshakes first here, before trying at GPUHASH.me...lol
     
    • Winner Winner x 1
  3. ilyas110298

    ilyas110298 Member

    Joined:
    12 Nov 2020
    Messages:
    2
    Likes Received:
    0
    Thank you sooo much

    Do you mind telling me how you did it, which wordlist did you use just for my future endeavors
     

Share This Page

Loading...
  • About Us

    We are a community mixed with professionals and beginners with an interest in wireless security, auditing and pentesting. Feel free to check out and upload resources.


    You can also find us on: Twitter and Facebook

  • Donate to Us

    Did you find our forums useful? Feel free to donate Bitcoin to us using the form below. Those who donate the equivlent of $10 USD or more will be upgraded to VIP membership. Don't have Bitcoin? Use your credit card to GO VIP here. Don't want to fork out some coin? There are other ways to GO VIP. Bitcoin: 1LMTGSoTyJWXuy2mQkHfgMzD7ez74x1Z8K