Pre-Computed Hash Files for NETGEARXX & MyCharterWiFiXX

Discussion in 'Dictionary, Password & Wordlists' started by indycoltsfan84, 29 Sep 2016.

  1. indycoltsfan84

    indycoltsfan84 Active Member

    Joined:
    16 Jan 2016
    Messages:
    23
    Likes Received:
    12
    Well after about 5 days of working on these files i finally finished! Listed below are links to 356 hash files, these files can be used to crack NETGEARXX & MyCharterWiFiXX WPA/WPA2 handshakes. The files were made using pyrits database functions & the "export_cowpatty" command. I did multiple tests using these files with pyrit & cowpatty. They should work with other programs as well as long as they support cowpatty hash files.

    The hash files are populated with passwords that follow the adjective+noun+3d & adjective+noun+1d. Over 30 million passwords in each file!


    These files will significantly improve the speed of cracking your handshake! That is the purpose of these files.


    These files are meant to attack NETGEARXX & MyCharterWiFiXX handshakes. These files are useless when attacking other SSID's!



    ALL FILES ARE SSID SPECIFIC!

    NETGEARXX Links (100 SSID's)

    Code:
    Select All
    Download Link List in Attachments


    MyCharterWiFiXX Links (256 SSID's)

    Code:
    Select All
    Download Link List in Attachments


    Please Reply in thread or PM to report any dead links!
     

    Attached Files:

    • Like Like x 2
  2. Garry Andrew

    Garry Andrew Active Member

    Joined:
    31 Jul 2012
    Messages:
    30
    Likes Received:
    9
    --- Double Post Merged, 8 Oct 2016, Original Post Date: 8 Oct 2016 ---
    Sure has been a lot of work put into this! Amazing. For those just discovering it, indycoltsfan84, has put together an amazing assortment of files for Charter & Netgear Routers. Windows users will be disappointed or even better still, properly challenged to have a go with the Linux Cowpatty and the Linux Pyrit programs. These are included in most versions of the virtual boot CD of Reaver, as standard. You will need to go to the console to call them up, after booting up Reaver from your CD drive.The trick then is to learn the Cowpatty & Pyrit command line actions.

    So why Cowpatty & Pyrit? Both use the time trade off method by being able to use pre computation method. PMK. Windows users may be familiar with the Rainbow method that is used with Rainbow tables for NTLM hash testing. Cowpatty & Pyrit similiarly uses pmk on cap files in a similiar way as an extra bonus for speeds are even faster, especially on GPU.

    The beauty of these tables is that members who have not done it before can practice using files of their choice, possibly on handshakes they have already done, to get an idea of things. I have downloaded two of indycoltfan84's, Netgear files. Each was 1.3ghz in size with the 7z zip file containing closer to 1.5ghz, containing one pmk file per SSID. Ready for Cowpatty or Pyrit. You can see the amount of work just on the Netgear files listed. 100 files at 1.3ghz. I was a little daunted by each size but the good news is the file site supports multiple downloads and you can use a downloader using the final link's button properties. Remember to omit the word Netgear*** from the end of the link given by indycoltfan84, so you can proceed. It's important the right SSID file is used, as the SSID is the seed to get the password.

    Stating just a little........ of the obvious in my post but hopefully it assist others on finding what its all this is about.

    We still need to keep a look out for even more words and contribute as best we can on the other thread.
    --- Double Post Merged, 15 Oct 2016 ---
    So at the risk of being red faced, could I have a bit of help regarding how to qualify the path statements when using Linux? Typically there is Cowpatty & Pyrit built into Xiaopan. In window$, I would put a drive letter say C:\ etc\ etc. In Xiaopan Linux, there is a root drive. Usually I save the handshake to a USB flash drive, which I have already mounted using the mounting icon. In the console, I am aware of the correct Cowpatty & Pyrit commandline commands. Assuming the console knows about Cowpatty & Pyrit already (? - do I need to tell it) , what is the way to tell these two programs in Xiaopan to read (a) my handshake and (b) to read my Genpmk file from the usb flash drive. I am assuming Cowpatty & Pyrit are not mind readers and that I need to point the structure toward the flash drive so everything can proceed. Seems to be lots of tuts for Backtrack, Kali etc but not Xiaopan.

    Basic help & example appreciated. Mainly the understanding of pointing the path to my 8GB USB flash drive.
     
  3. indycoltsfan84

    indycoltsfan84 Active Member

    Joined:
    16 Jan 2016
    Messages:
    23
    Likes Received:
    12
    You will need need to specify the path to both files.

    A quick to test to see if cowpatty & pyrit are installed is to simply type "cowpatty" or "pyrit" in your console
    --- Double Post Merged, 15 Oct 2016, Original Post Date: 15 Oct 2016 ---
    A quick example would be

    cowpatty -r path to handshake -d path to hash file -s network SSID

    if path to either file contains any spaces, you will need to wrap it inside quotes "path to file"
     
  4. komawoyo

    komawoyo Active Member

    Joined:
    7 May 2015
    Messages:
    3
    Likes Received:
    0
    hello,
    does anyone have a copy of these? I dont have a strong computer and would like to use this

    thanks
     
  5. Ben Ferg

    Ben Ferg New Member

    Joined:
    23 Mar 2018
    Messages:
    2
    Likes Received:
    0
    Anyway we could get a re-upload on these? Promptfile seems to me non-existent.
     
  6. Gimmegimmegimme

    Gimmegimmegimme New Member

    Joined:
    18 Apr 2018
    Messages:
    4
    Likes Received:
    0
    These are probably out of date by now, try this thread instead:

    https://xiaopan.co/forums/downloads/netgearxx-wordlist-by-gearjunkie.415/

    It only took about an hour to go through the list on my Linux pc in aircrack. It didn't find mine, but it does seem to work for a lot of other people.
    --- Double Post Merged, 21 Apr 2018, Original Post Date: 20 Apr 2018 ---
    sorry it took about a few hours, I confused that with my area-code based crunch list that took about an hour with a preset+7 random numbers. I ran them off the cpu though but I guess hashcat would be quicker.
     
  7. fvnm

    fvnm Member

    Joined:
    8 Jul 2018
    Messages:
    3
    Likes Received:
    0
    Deadlinks... can I get the file.for the mycharterwifi68-2g

     
  8. WindowsHaxor

    WindowsHaxor Active Member

    Joined:
    23 Aug 2013
    Messages:
    12
    Likes Received:
    6
    Links dead please reupload!!
     
Loading...
  • About Us

    We are a community mixed with professionals and beginners with an interest in wireless security, auditing and pentesting. Feel free to check out and upload resources.


    You can also find us on: Twitter and Facebook

  • Donate to Us

    Did you find our forums useful? Feel free to donate Bitcoin to us using the form below. Those who donate the equivlent of $10 USD or more will be upgraded to VIP membership. Don't have Bitcoin? Use your credit card to GO VIP here. Don't want to fork out some coin? There are other ways to GO VIP. Bitcoin: 1LMTGSoTyJWXuy2mQkHfgMzD7ez74x1Z8K