NETGEARXX wordlist 1.08

Extremely effective WPA default wordlist

  1. Zazaroth

    Zazaroth Active Member

    Joined:
    9 Nov 2017
    Messages:
    13
    Likes Received:
    1
    Use the netgear.txt and run hashcat like this
    hashcat64.exe -m 2500 -a 6 .hccapx netgear.txt ?d?d?d
    and for multiple wordlist vs a hccapx is like this
    hashcat64.exe -m 2500 .hccapx FolderWithWordlist
     
  2. JoshenMing

    JoshenMing Member

    Joined:
    13 Feb 2019
    Messages:
    4
    Likes Received:
    0
    Thanks. Can you use 3 separate lists with Aircrack? Something like this?


    aircrack-ng -b [bssid of router] -w Desktop/adjective.txt, noun.txt, 3digit.txt Desktop/wpa-01.cap

    Will it run all 3 lists and be able to crack the whole wpa password if it's default?
     
  3. Zazaroth

    Zazaroth Active Member

    Joined:
    9 Nov 2017
    Messages:
    13
    Likes Received:
    1
    I honestly dont use aircrack just because hashcat is so much faster. Thats what the -a 6 does. its applies the hash ?d?d?d at the end of netgear.txt which is all the known noun + adj list. So you dont have to use adj.txt, noun.txt, 3digit.txt. its done inside hashcat
     
  4. JoshenMing

    JoshenMing Member

    Joined:
    13 Feb 2019
    Messages:
    4
    Likes Received:
    0
    Thanks again, Will look at this. No need to convert .txt/.lst to other format for hashcat?
     
  5. Zazaroth

    Zazaroth Active Member

    Joined:
    9 Nov 2017
    Messages:
    13
    Likes Received:
    1
    Np bud, For the dictionaries i only have .txt's. never used any other format. if you have excel lists its pretty easy to convert
     
  6. P8712

    P8712 Active Member

    Joined:
    28 Oct 2016
    Messages:
    8
    Likes Received:
    1
    I ran this through the adj+noun+3digit wordlist with no luck. Any ideas? Thanks.
     
  7. computeruser2

    computeruser2 Active Member

    Joined:
    23 Mar 2016
    Messages:
    4
    Likes Received:
    0
    Can someone help me with these 3 handshake/pmkid files? If you make an attempt, please let me know what list you used even if you weren't successful.

    Very much appreciated. Thank you!
     

    Attached Files:

    #727 computeruser2, 26 Feb 2019
    Last edited: 26 Feb 2019
  8. Zazaroth

    Zazaroth Active Member

    Joined:
    9 Nov 2017
    Messages:
    13
    Likes Received:
    1
    ffd922e99fb5cdc305d1e5b19472e895:d8a756703a86:4cefc0453b87:MySpectrumWiFi80-2G:livelygate577
     
    • Like Like x 1
  9. computeruser2

    computeruser2 Active Member

    Joined:
    23 Mar 2016
    Messages:
    4
    Likes Received:
    0
    Thank you!
     
  10. P8712

    P8712 Active Member

    Joined:
    28 Oct 2016
    Messages:
    8
    Likes Received:
    1
    I'm still frustrated with this cap - I use the WPAkit tool to run the 'basic' noun+adj+3dig and then tried the 'full' list - 27 gigs of combinations. Still no hits. I suppose I should assume they're not using a default password.
     
    • Like Like x 1
  11. computeruser2

    computeruser2 Active Member

    Joined:
    23 Mar 2016
    Messages:
    4
    Likes Received:
    0
    Got it. Thanks for trying. That could be the case that they're not using a default password. I really appreciate the effort.
     
  12. P8712

    P8712 Active Member

    Joined:
    28 Oct 2016
    Messages:
    8
    Likes Received:
    1
    This cap is still giving me fits. Can anyone help? Thanks.
     
  13. sonicpunk32

    sonicpunk32 Active Member

    Joined:
    16 Aug 2017
    Messages:
    2
    Likes Received:
    0
    Hey, can anyone help me crack this one?

    I would very much appreciate the help.
     

    Attached Files:

  14. PeterParker

    PeterParker Member

    Joined:
    24 Aug 2018
    Messages:
    3
    Likes Received:
    0
    I cannot find out this one. It should be simple WPS, but I am not having any luck... Anyone wants to try?
     

    Attached Files:

  15. wildstyle10

    wildstyle10 New Member

    Joined:
    15 Nov 2018
    Messages:
    8
    Likes Received:
    0
    I know this isn't netgear related but I need some help with fixing a hashcat v 5.0.0 error I'm receiving.
    I have a sha512crypt hash I'm trying to crack for a CTF but when I run the command,
    ./hashcat64.exe -m 1800 ldapuser2.txt rockyou.txt
    i get the error,
    Byte Order Mark (BOM) was detected.
    How do I fix this?
    The hash format I have in the file is,
    $6$xJxPjT0M$1m8kM00CJYCAgzT4qz8TQwyGFQvk3boaymuAmMZCOfm3OA7OKunLZZlqytUp2dun509OBE2xwX/QEfjdRQzgn1

    Do I need to re-format this hash ?
    Please Help!
    It runs fine with john in kali linux VM
    However, I would like to utilize my GPU to crack it faster with hashcat.
    Any suggestions?
    --- Double Post Merged, 8 Mar 2019, Original Post Date: 8 Mar 2019 ---
    Wow I figured it out,
    sorry for posting this in the forum but if anybody else gets this error, it's because,
    for some reason if you echo
    'hashNumbers' > file.txt
    it saves in an in proper format
    Instead i just opened notepad and pasted the hash and it works, wow. LOL
     
  16. m.montuano

    m.montuano New Member

    Joined:
    19 Mar 2018
    Messages:
    12
    Likes Received:
    0
    Can someone help me with this please?
     

    Attached Files:

  17. Zwh02

    Zwh02 Member

    Joined:
    13 Jun 2018
    Messages:
    6
    Likes Received:
    0
    New neighbor! Help much appreciated!
     

    Attached Files:

    • wpa.cap
      File size:
      595 bytes
      Views:
      7
  18. SilentRage

    SilentRage Active Member

    Joined:
    28 Sep 2015
    Messages:
    2
    Likes Received:
    0
    Could i get anyone to try this one? I've tried it two times before, once the power got unplugged about 50% thru and powered off, 2nd time the window got accidentally closed out. I'm starting my 3rd attempt, which the e.t.a. is 2 days 16 hours.
     

    Attached Files:

  19. carnivore1

    carnivore1 Member

    Joined:
    22 Jul 2018
    Messages:
    73
    Likes Received:
    7
    Capture.PNG There you go...Carnivore1
     
  20. kn0w1

    kn0w1 New Member

    Joined:
    16 Dec 2018
    Messages:
    10
    Likes Received:
    0
    Hey Guys, I need some heeelp. Ive tried breaking these three hs captured with wifite for a while now, to no avail.. Ive been using netgear killer, as well as rock you. I just cant seem to have any luck. Any help would be greatly appreciated. The 1C:B0 is a askey charter device, the CC: is a netgear AP, the third is self explanatory. Still learning daily, gave cow patty a go with the netgear13ext using rock you and netgear killer in kali... no joy.
     
Loading...
  • About Us

    We are a community mixed with professionals and beginners with an interest in wireless security, auditing and pentesting. Feel free to check out and upload resources.


    You can also find us on: Twitter and Facebook

  • Donate to Us

    Did you find our forums useful? Feel free to donate Bitcoin to us using the form below. Those who donate the equivlent of $10 USD or more will be upgraded to VIP membership. Don't have Bitcoin? Use your credit card to GO VIP here. Don't want to fork out some coin? There are other ways to GO VIP. Bitcoin: 1LMTGSoTyJWXuy2mQkHfgMzD7ez74x1Z8K