hii i have a file in my android with name "wpa_supplicant.conf"
i see the password on my wifi in the value psk=****** (32 digit)
but i dot found any tools to decrypt the psk to the password
can anyone help me?
Hi ware55.
use hashcat hashmode -m 12000
and read basic information (how-to) here:
https://hashcat.net/forum/thread-6661-po...l#pid35846
In case of an ANDROID hotspot default password:
on older ANDROIDs (ssid = AndroidAP) try this mask:
?l?l?l?l?d?d?d?d
on latest ANDROIDs, the password is:
first 12 xdigits of the uuid (xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx)
this is not working.
my hash is like a MD5 (128bit)
i have same like this (this is a example from google)
network={
ssid=""
psk=fce6c4f64304b00c5783199bbd2b1f91
key_mgmt=WPA-PSK
priority=10
frequency=2462
autojoin=1
usable_internet=0
skip_internet_check=0
}
what can i do?
(12-17-2017, 11:28 AM)ZerBea Wrote: [ -> ]Hi ware55.
use hashcat hashmode -m 12000
and read basic information (how-to) here:
https://hashcat.net/forum/thread-6661-po...l#pid35846
In case of an ANDROID hotspot default password:
on older ANDROIDs (ssid = AndroidAP) try this mask:
?l?l?l?l?d?d?d?d
on latest ANDROIDs, the password is:
first 12 xdigits of the uuid (xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx)
Thanks for the additional informations. Now I understand what you mean.
Well, I assume
- you use a SAMSUNG ANDROID device (?)
- you have secure storage activated (?)
- your device is rooted (?)
The bad news:
I do not know about an all-in-one tool to recover this secured passwords.
Read more about secure storage here:
https://nelenkov.blogspot.de/2012/05/sto...roids.html
and here:
https://forum.xda-developers.com/showthr...?t=2620337
Use adb root shell to disable secure storage (you need to type your WiFi passwords new, so this will not help you to retrieve your old passwords).
ANDROID use a masterkey, derived from the device unlock password or PIN
to encrypt (AES 128 bit) the WiFi passwords.
Read more about the PIN here:
https://hashcat.net/forum/thread-2202-po...l#pid13176
The good news (there is another to way recover the password):
capture an authentication sequence from your phone
convert the cap to hccapx
run hashcat -m 2500 and a wordlist containing your favourite passwords against this hccapx
i was wondering myself how could u decrypt this part psk=fce6c4f64304b00c5783199bbd2b1f91
@atom any idea?