Keyspace List for WPA on Default Routers - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: User Contributions (https://hashcat.net/forum/forum-25.html) +--- Thread: Keyspace List for WPA on Default Routers (/thread-6170.html) |
RE: Keyspace List for WPA on Default Routers - ZerBea - 06-11-2021 $ cat noun | awk 'length($0)==6' > w6 $ cat noun | awk 'length($0)==5' > w5 Code: #include <stdio.h> $ ./digit > digit4 $ combinator3 w5 digit4 w6 | hashcat -m 22000 hash.22000 $ combinator3 w6 digit4 w5 | hashcat -m 22000 hash.22000 Very old model: https://wpa-sec.stanev.org/?search=XFSETUP RE: Keyspace List for WPA on Default Routers - drsnooker - 06-12-2021 Thanks Zerbea! I manually just modified the large netgear word list with 4 numbers then use a -1... However, now I need to fill out a bug/anomaly report, because hashcat a -1's dictionaries require a char(10) followed by char(13) or else it thinks the dictionary is empty. All the other dictionaries just need a char(13) RE: Keyspace List for WPA on Default Routers - ZerBea - 06-12-2021 Do you mean this mode, where e.g. w5dg4 = album0001 and w6 = anchor $ hashcat -a 1 -m 22000 zn.22000 -S w5dg4 w6 Code: hashcat (v6.2.1-157-g388e0a1c7) starting... I can't confirm the problem, you mentioned. 0x0a is enough at the end of the line (combination of 0x0a 0x0d is not mandatory). Attached example part of the lists (each line terminated with 0x0a) used above - viewing it, running ghex will confirm this: example.zip (Size: 462 bytes / Downloads: 0) A look at the source code will confirm this, too, in superchop_with_length(): https://github.com/hashcat/hashcat/blob/master/src/filehandling.c#L711 hashcat accept 0x0a https://github.com/hashcat/hashcat/blob/master/src/filehandling.c#L717 as well as 0x0d https://github.com/hashcat/hashcat/blob/master/src/filehandling.c#L726 or in in_superchop(): https://github.com/hashcat/hashcat/blob/master/src/filehandling.c#L681 0x0a: https://github.com/hashcat/hashcat/blob/master/src/filehandling.c#L687 0x0d: https://github.com/hashcat/hashcat/blob/master/src/filehandling.c#L696 RE: Keyspace List for WPA on Default Routers - ZerBea - 06-13-2021 Could be related to the generation of your lists in combination with your OS. I'm running Arch Linux: $ uname -r 5.12.10-arch1-1 BTW: If you're looking for an up-to-date word list that contain real PSKs beside https://wpa-sec.stanev.org/dict/cracked.txt.gz please take a look at the daily snapshot of "Download Found Lists" here: https://hashmob.net/downloads Code: Download Found Lists If you take a look at "Download Left Lists" at the end of this page, you'll notice that hash mode 22000 is full supported: Code: WPA-PBKDF2-PMKID+EAPOL 1 (22000) We can assume that findings of "WPA-PBKDF2-PMKID+EAPOL" hash list will be stored to the Daily Found List. So this list will contain real PSKs (from WiFi), too. RE: Keyspace List for WPA on Default Routers - drsnooker - 06-13-2021 I'm running windows 10 x64 separators that work char(10) char(10)+char(13) char(13)+char(10) separator that doesn't work: char(13) Interesting that for -a 1 you get an error message xxxxx.txt: empty file but for generic dictionary attack It just shows: Guess Queue 1/1 so if you run dictionaries in batch mode, you don't even notice that it didn't use the dictionary RE: Keyspace List for WPA on Default Routers - ZerBea - 06-13-2021 Thanks for your detailed explanation. I can confirm that on Linux, too if: w5 is a txt file where 0x0a is replaced by 0x0d $ hashcat -a 1 -m 22000 zn.22000 -S w5 dg4w6 hashcat (v6.2.1-171-g3ee77aa58) starting... Dictionary cache built: * Filename..: w5 * Passwords.: 1 * Bytes.....: 421 * Keyspace..: 0 * Runtime...: 0 secs w5: empty file. Started: Sun Jun 13 23:31:25 2021 Stopped: Sun Jun 13 23:31:26 2021 Using a single 0x0d to terminate a line is a very old standard used by ancient systems, e.g.: Commodore 8-bit machines (C64, C128), Acorn BBC, ZX Spectrum, TRS-80, Apple II series, Oberon, the classic Mac OS, MIT Lisp Machine and OS-9 None of my Linux tools (e.g. Geany) is doing this (except I replace 0x0a by 0x0d using GHEX, awk, sed, ...). A good explanation of the standard/behavior is here: https://superuser.com/questions/374028/how-are-n-and-r-handled-differently-on-linux-and-windows and, of course, here: https://en.wikipedia.org/wiki/CRLF RE: Keyspace List for WPA on Default Routers - drsnooker - 08-23-2021 (08-23-2021, 06:11 PM)scriptkiddy Wrote: There is a company in india called Jio. Can you provide deafault pass of JioFiber routers?? Might want to check out ebay for what their default passwords look like. Then see if you can find a pattern! <edit add-on> Not much on ebay, but some on Facebook marketplace. It's 10 characters: lower case and numbers mixed together. You might want to try some things like SHA1 or MD5 on the serial and then mod 36 on each byte to see if that gets you something. Not particularly likely, but worth a shot. Probably have to brute force these... RE: Keyspace List for WPA on Default Routers - royce - 04-13-2022 https://packetstormsecurity.com/files/166712/ZSL-2022-5701.txt "The password is generated using the last 4 values from device's MAC address which is disclosed on the main webUI login page to an unauthenticated attacker. The values are then concatenated with the string 'LTEFemto' resulting in something like 'LTEFemtoD080' as the default Admin password." RE: Keyspace List for WPA on Default Routers - drsnooker - 06-08-2022 Found some Zyxel related default keyspace materials: Luc10 on github has Zykgen generator for the Zyxel VMG8823 from various forum entries here. Mostly used in Italy though. The French Canadian Videotron (Zyxel EMG2926) looks very similar to the cosmopolitan in Zykgen, with a few subsitutions in the charset. Somebody with a vested interest might have time to close the loop on this one. Code: Password ESSID SN MAC RE: Keyspace List for WPA on Default Routers - drsnooker - 06-11-2022 Finished the full conversion and simplification of the default WIFI password generators for the ZyXEL VMG3312 (based on GPUhash_me on hashkiller) as well as the Zyxel VMG8823 (VMG8825, VMG4825, VMG3925, others???) from Lucio Corsa's Zykgen, to Matlab. Plum on Hashkiller has converted the second one to python3! Either way, it now allows me to make rainbow tables for those modems. However, the goal was to try and modify them to the videotron charset and there I sadly struck out. That's got to be another algo... One thing these two algos have in common is that it starts with an MD5 of the serial number, then does some string manipulations (insertions, addons) of the lower case hex-hash, before doing another MD5 of the resulting string. The password is based on the second MD5, with some creative math or just pulled from the middle of the hex-hash. There's really no guessing what these manipulations are, unless you have the algo pulled from the firmware. So little hope on discovering this from the stickers. |