Hi, I'm attempting to crack a Bigpond 10 Hex Uppercase handshake captured from my BigPond router. (image thanks to Hot_Pursuit) So far I have been following the method from Black More Ops http://www.blackmoreops.com/2014/03/10/cracking-wifi-wpawpa2-passwords-using-pyrit-cowpatty/ Keeping in mind the password contains 10 UPPERCASE alpha-numeric characters I have written a script Code: Select All crunch 10 10 -p ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 which returns The file-size is HUUUGEEEEE and even though I included the "-p" attribute. The wordlist is still generating repetitive characters at the start. This is all making me realize how much of a noob I am because the password list must contain a combination of all the characters, so it can find a potential match (not just 10 characters) all this is making me realize I know anything about cracking. Is there a better method to pursue for cracking 10 HEX alpha-numeric-uppercase passwords or a tutorial someone guide me through for creating the list?
I'm sorry to tell you that none of us will live long enough to see those 10 mixed characters cracked, not even if you have a specially built cracking rig. But if you really have nothing else to do, try a crunch hashcat passthrough. You'll need a gpu and either cudahashcat (for Nvidia cards) or oclhashcat (for AMD gpu's). Let me see if I can find the legacy download links: https://hashcat.net/files_legacy/oclHashcat-2.01.7z https://hashcat.net/files_legacy/cudaHashcat-2.01.7z (newest hashcat 3.10 is... complicated! lol) Under Windows, unpack the archive and put it inside your user folder. Then open a cmd prompt and then change directories into the hashcat folder, then paste this in and press ENTER: cudahashcat64 -m 2500 -a 3 -1 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ handhake.hccap ?1?1?1?1?1?1?1?1?1?1 (first change "handshake" to the actual capture name, and if you're on a 32 bit system use 32 instead of 64 in hashcat's name) OH, and if you need to convert a cap or pcap to a hccap, you could use: https://hashcat.net/cap2hccap/ or better yet do it locally with aircrack. This will create "handshake.hccap": aircrack-ng handshake.cap -J handshake INFO: In hashcat, to pause and restart later, pause with CTRL+C and restart it with: cudaHashcat64 --session cudaHashcat --restore EDIT: Uh, are you feeling lucky? Knock that 10 crunch down to 8 and you -might- live long enough to get it done. Try using the first two characters which follow BigPond in the SSID and crunch for the last 8. If the first two are AA and the handshake is named "shake" your attempt will look like this cudahashcat64 -m 2500 -a 3 -1 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ shake.hccap AA?1?1?1?1?1?1?1?1 I haven't tried that length so I don't know for sure. but I'd guess that might complete in a few months. GOOD LUCK! --- Double Post Merged, 8 Sep 2016, Original Post Date: 6 Sep 2016 --- OH MY, before you spend months on that, pause it and save the cudaHashcat.restore file so you can get back to it. Some BigPond use 10 digits so spend a day running this to see if it cracks: cudahashcat64 -m 2500 -a 3 shake.hccap ?d?d?d?d?d?d?d?d?d?d