WPA / WPA2 Auditing Service

Discussion in 'Community Services' started by Mr. Penguin, 11 Apr 2013.

  1. longshanks

    longshanks Well-Known Member
    VIP

    Joined:
    1 Jul 2016
    Messages:
    337
    Likes Received:
    155
    @esl_said21
    working on it, some are easy,some are hard and some are almost impossible. :cigar:
     
    • Like Like x 1
    • Friendly Friendly x 1
  2. esl_said21

    esl_said21 Active Member

    Joined:
    9 Sep 2019
    Messages:
    4
    Likes Received:
    3
    you are the best :playful:
     
    • Like Like x 1
    • Funny Funny x 1
  3. longshanks

    longshanks Well-Known Member
    VIP

    Joined:
    1 Jul 2016
    Messages:
    337
    Likes Received:
    155
    Screenshot from 2019-09-10 10-37-04.png
     
    • Winner Winner x 1
    • Friendly Friendly x 1
  4. hashC.co.uk

    hashC.co.uk Active Member

    Joined:
    19 Mar 2019
    Messages:
    13
    Likes Received:
    6
    TEdataF07986:11924021
     
    • Like Like x 1
    • Friendly Friendly x 1
    • Laugh My Ass Off Laugh My Ass Off x 1
  5. esl_said21

    esl_said21 Active Member

    Joined:
    9 Sep 2019
    Messages:
    4
    Likes Received:
    3
    Thank you for helping me you are awesome :happy:
     
    • Informative Informative x 1
  6. medo-es

    medo-es Active Member

    Joined:
    10 Sep 2019
    Messages:
    4
    Likes Received:
    1
    @longshanks
    can you help me to get password
    --- Double Post Merged, 10 Sep 2019, Original Post Date: 10 Sep 2019 ---
    @longshanks
    that´s a new file
    --- Double Post Merged, 10 Sep 2019 ---
    new
     

    Attached Files:

    • Like Like x 1
  7. 666thAngel

    666thAngel Well-Known Member

    Joined:
    11 Sep 2019
    Messages:
    11
    Likes Received:
    9
    Pass found at gpuhash.me
    Type: WPA/WPA2 EAPOL
    ESSID: NTGR_8DF5
    BSSID: 10:DA:43:59:8D:F5 (Netgear)
    STMAC: 6C:4D:73:98:60:43 (Apple, Inc.)
    MIC: F9895ACD3188359D4BF7E4675A104FA5
    Basic search

    Unfortunatelly my PC is dead now, so i can't bite it :(
    C'mon, guys :*
     

    Attached Files:

    • Like Like x 1
  8. hashC.co.uk

    hashC.co.uk Active Member

    Joined:
    19 Mar 2019
    Messages:
    13
    Likes Received:
    6
    NTGR_8DF5:92844776
     
    • Like Like x 1
    • Friendly Friendly x 1
  9. 666thAngel

    666thAngel Well-Known Member

    Joined:
    11 Sep 2019
    Messages:
    11
    Likes Received:
    9
    Awww... Thanks a lot, mate! Kisses!

    P.S. I've got harder bites at home ;)
    Not for now. Catch You later!
    --- Double Post Merged, 11 Sep 2019, Original Post Date: 11 Sep 2019 ---
    Oh, i forget i've got forbidden another one, but it's poor...
    gpuhash displayed this:

    Best handshake selected:
    ESSID.......: WLAN1-EYY53L
    BSSID.......: 30:A1:FA:9B:36:37 (Huawei Technologies Co.,Ltd)
    STMAC.......: 00:1A:73:C7:E3:78 (Gemtek Technology Co., Ltd.)
    Handshakes..: 1
    Quality: 0% (very poor)

    WARNING! Your best handshake is workable but has very
    poor quality. It will be better to capture another one.

    WLAN1-EYY53L (30:A1:FA:9B:36:37 <-> 00:1A:73:C7:E3:78)
    9C65173CEED48B902C5E7469C34F1DD2 HMAC_SHA1_AES M1+M2/M2, 707, 3550.9ms, 0/0, !auth, 0%

    ...and seems that i've already tried to put it into gpuhash, but i can't remember that! :(
    Can anything be done about it? Or should I catch a better handshake?
    Help me guys, please :)
     

    Attached Files:

    • Like Like x 1
  10. a1924028

    a1924028 Well-Known Member

    Joined:
    8 Dec 2012
    Messages:
    3
    Likes Received:
    3

    Attached Files:

    • Like Like x 1
  11. longshanks

    longshanks Well-Known Member
    VIP

    Joined:
    1 Jul 2016
    Messages:
    337
    Likes Received:
    155
    working on them :kiss:
    @666thAngel
    root@kali:~# aircrack-ng '/root/Downloads/666.pcap'
    Opening /root/Downloads/666.pcap
    Read 3 packets.

    # BSSID ESSID Encryption

    1 30:A1:FA:9B:36:37 WLAN1-EYY53L WPA (1 handshake)

    Choosing first network as target.

    Opening /root/Downloads/666.pcap
    Read 3 packets.

    1 potential targets

    Please specify a dictionary (option -w).

    root@kali:~# cowpatty -r '/root/Downloads/666.pcap' -s 666 -c
    cowpatty 4.8 - WPA-PSK dictionary attack. <jwright@hasborg.com>

    Collected all necessary data to mount crack against WPA2/PSK passphrase.
    root@kali:~# cap2hccapx '/root/Downloads/666.pcap' 666.hccapx
    Networks detected: 1

    [*] BSSID=30:a1:fa:9b:36:37 ESSID=WLAN1-EYY53L (Length: 12)

    Written 0 WPA Handshakes to: 666.hccapx
    It looked all good until i tried to convert it to hccapx for hashcat.
    looking at in in wireshark - there is too long of a time delay between m1 and m2.

    Screenshot from 2019-09-11 12-42-58.png
    --- Double Post Merged, 11 Sep 2019, Original Post Date: 11 Sep 2019 ---
    Get a new one (y)
     
    • Like Like x 1
    • Friendly Friendly x 1
  12. 666thAngel

    666thAngel Well-Known Member

    Joined:
    11 Sep 2019
    Messages:
    11
    Likes Received:
    9
    Type: WPA/WPA2 EAPOL
    ESSID: HUAWEI-B311-A35A
    BSSID: EC:56:23:04:A3:5A (Huawei Technologies Co.,Ltd)
    STMAC: C0:8C:71:46:00:86 (Motorola Mobility LLC, a Lenovo Company)
    MIC: 2E2FD032C84FBC31FB42A34A8AC7B899
    Not found in gpuhash, basic search.
    WPS unavailable
    Nah!
     

    Attached Files:

    • Like Like x 1
    • Friendly Friendly x 1
  13. Senior tito

    Senior tito New Member

    Joined:
    31 Aug 2019
    Messages:
    15
    Likes Received:
    3
    Help what is
    Command not found
    In run iconfig
     

    Attached Files:

    • Like Like x 1
  14. 666thAngel

    666thAngel Well-Known Member

    Joined:
    11 Sep 2019
    Messages:
    11
    Likes Received:
    9
    Hi, can You guys try this birthday one, please?
    Gpuhash didn't crack this...
    Your capture statistics:
    Access Points found: 1
    Handshakes found: 2

    Best handshake selected:
    ESSID.......: ZyXELCA74A6
    BSSID.......: 5C:E2:8C:CA:74:A7 (Zyxel Communications Corporation)
    STMAC.......: E4:F8:9C:31:BD:CA (Intel Corporate)
    Handshakes..: 2
    Quality: 100% (excellent)

    ZyXELCA74A6 (5C:E2:8C:CA:74:A7 <-> E4:F8:9C:31:BD:CA)
    4B99043E886AE20EDFF8765352CF8E1C HMAC_SHA1_AES M1+M2/M2, 11, 88.6ms, 0/0, !auth, 42%
    4B99043E886AE20EDFF8765352CF8E1C HMAC_SHA1_AES M2+M3/M2, 2, 16.4ms, 0/1, auth, 100%
     

    Attached Files:

  15. ghostman

    ghostman Active Member

    Joined:
    19 Jul 2019
    Messages:
    8
    Likes Received:
    3
    ;-) any one want to see if they can crack these for me friends ? thanks kinda curios to see if they are solvable still in recovery mode hope your all well.. let me no if you find these thanks
     

    Attached Files:

    • Wow Wow x 1
  16. longshanks

    longshanks Well-Known Member
    VIP

    Joined:
    1 Jul 2016
    Messages:
    337
    Likes Received:
    155
    @666thAngel If gpuhash.me can't crack it. Pretty much ,no one else can :bucktooth:
     
    • Like Like x 1
    • Oops Oops x 1
  17. 666thAngel

    666thAngel Well-Known Member

    Joined:
    11 Sep 2019
    Messages:
    11
    Likes Received:
    9
    I ment it can't crack it with basic search ;)
     
    • Like Like x 1
  18. longshanks

    longshanks Well-Known Member
    VIP

    Joined:
    1 Jul 2016
    Messages:
    337
    Likes Received:
    155
    #2564 ghostman, 19 Jul 2019
    You have already posted these before :vomit:

    Screenshot from 2019-09-13 10-54-39.png What is this? Target one network and one station. what is so hard about that, nah you guys try to get a handshake with a bloody scatter gun. :wacky:
    --- Double Post Merged, 13 Sep 2019 at 7:36 AM, Original Post Date: 13 Sep 2019 at 7:28 AM ---
    Yeah well, the default passwords for
    ZyXELXXXXXX [10:0-9 A-F][13:0-9 A-Z] Len: 10 or 13

    Screenshot from 2019-09-13 11-36-09.png
     
    #2698 longshanks, 13 Sep 2019 at 7:36 AM
    Last edited: 13 Sep 2019 at 10:30 AM
    • Informative Informative x 1
  19. 666thAngel

    666thAngel Well-Known Member

    Joined:
    11 Sep 2019
    Messages:
    11
    Likes Received:
    9
    @longshanks
    It's not for my poor laptop now :D
    Tell me please, how long would it take to break its PMKID hash?
    bbc160c18061429aad69af97700298ac
    Maybe I'll try to do it on my friend's PC... (my machine is still dead as hell)
    ...but i need to learn something about it :)
     
    • Like Like x 1
  20. longshanks

    longshanks Well-Known Member
    VIP

    Joined:
    1 Jul 2016
    Messages:
    337
    Likes Received:
    155
    They take about the same time as a hccapx :cigar:
    I'll run it through my passwordlists , just in case they changed it from default. (y)
    --- Double Post Merged, 13 Sep 2019 at 10:47 AM, Original Post Date: 13 Sep 2019 at 10:29 AM ---
    @666thAngel I hear that the wps pins are easy to crack on those Zyxel modems.
    Try reaver or bully on it. :)
     
    • Like Like x 2
Loading...
  • About Us

    We are a community mixed with professionals and beginners with an interest in wireless security, auditing and pentesting. Feel free to check out and upload resources.


    You can also find us on: Twitter and Facebook

  • Donate to Us

    Did you find our forums useful? Feel free to donate Bitcoin to us using the form below. Those who donate the equivlent of $10 USD or more will be upgraded to VIP membership. Don't have Bitcoin? Use your credit card to GO VIP here. Don't want to fork out some coin? There are other ways to GO VIP. Bitcoin: 1LMTGSoTyJWXuy2mQkHfgMzD7ez74x1Z8K