Requesting Tutorial For 10 HEX alpha-numeric Uppercase

Discussion in 'Dictionary, Password & Wordlists' started by xtcfrzty, 28 Oct 2015.

  1. xtcfrzty

    xtcfrzty Member

    Joined:
    27 Oct 2015
    Messages:
    2
    Likes Received:
    0
    Hi, I'm attempting to crack a Bigpond 10 Hex Uppercase
    handshake captured from my BigPond router.

    [​IMG]
    (image thanks to Hot_Pursuit)

    So far I have been following the method from Black More Ops
    http://www.blackmoreops.com/2014/03/10/cracking-wifi-wpawpa2-passwords-using-pyrit-cowpatty/


    Keeping in mind the password contains 10 UPPERCASE alpha-numeric characters

    I have written a script

    Code:
    Select All
    crunch 10 10 -p ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789
    which returns



    The file-size is HUUUGEEEEE and even though I included the
    "-p" attribute. The wordlist is still generating repetitive characters at the start.

    This is all making me realize how much of a noob I am because
    the password list must contain a combination of all the characters, so it can find
    a potential match (not just 10 characters) all this is making me realize I know
    anything about cracking.


    Is there a better method to pursue for cracking 10 HEX alpha-numeric-uppercase
    passwords or a tutorial someone guide me through for creating the list?
     
  2. wawawa3

    wawawa3 Active Member

    Joined:
    7 Apr 2015
    Messages:
    35
    Likes Received:
    12
    I'm sorry to tell you that none of us will live long enough to see those 10 mixed characters cracked, not even if you have a specially built cracking rig. But if you really have nothing else to do, try a crunch hashcat passthrough. You'll need a gpu and either cudahashcat (for Nvidia cards) or oclhashcat (for AMD gpu's). Let me see if I can find the legacy download links:
    https://hashcat.net/files_legacy/oclHashcat-2.01.7z
    https://hashcat.net/files_legacy/cudaHashcat-2.01.7z
    (newest hashcat 3.10 is... complicated! lol)
    Under Windows, unpack the archive and put it inside your user folder. Then open a cmd prompt and then change directories into the hashcat folder, then paste this in and press ENTER:
    cudahashcat64 -m 2500 -a 3 -1 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ handhake.hccap ?1?1?1?1?1?1?1?1?1?1
    (first change "handshake" to the actual capture name, and if you're on a 32 bit system use 32 instead of 64 in hashcat's name)
    OH, and if you need to convert a cap or pcap to a hccap, you could use:
    https://hashcat.net/cap2hccap/
    or better yet do it locally with aircrack. This will create "handshake.hccap":
    aircrack-ng handshake.cap -J handshake
    INFO: In hashcat, to pause and restart later, pause with CTRL+C and restart it with:
    cudaHashcat64 --session cudaHashcat --restore

    EDIT:
    Uh, are you feeling lucky? Knock that 10 crunch down to 8 and you -might- live long enough to get it done. Try using the first two characters which follow BigPond in the SSID and crunch for the last 8. If the first two are AA and the handshake is named "shake" your attempt will look like this
    cudahashcat64 -m 2500 -a 3 -1 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ shake.hccap AA?1?1?1?1?1?1?1?1
    I haven't tried that length so I don't know for sure. but I'd guess that might complete in a few months. GOOD LUCK!
    --- Double Post Merged, 8 Sep 2016, Original Post Date: 6 Sep 2016 ---
    OH MY, before you spend months on that, pause it and save the cudaHashcat.restore file so you can get back to it. Some BigPond use 10 digits so spend a day running this to see if it cracks:
    cudahashcat64 -m 2500 -a 3 shake.hccap ?d?d?d?d?d?d?d?d?d?d
     

Share This Page

Loading...