Getting previous router password when cracking - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Getting previous router password when cracking (/thread-10659.html) Pages:
1
2
|
Getting previous router password when cracking - hashmando - 03-16-2022 I've been trying to crack my home WiFi passwords for my final year project at university. When hashcat has finished cracking the password, the password that is revealed is not the current password for the router I am trying to crack, but instead a previous one. Any help ? RE: Getting previous router password when cracking - Snoopy - 03-16-2022 you maybe used the same capturfile or hash? RE: Getting previous router password when cracking - hashmando - 03-16-2022 (03-16-2022, 02:31 PM)Snoopy Wrote: you maybe used the same capturfile or hash? I deleted all of the files that had been made in my previous attempts and still got the same result. RE: Getting previous router password when cracking - Snoopy - 03-16-2022 how did you captured the wlan password? did you used the new ncxtools? did you changed both wifi passwords? most wifi routers have the ability to use different BSSID and passes for 2.4 GHz and 5GHz RE: Getting previous router password when cracking - hashmando - 03-16-2022 (03-16-2022, 02:44 PM)Snoopy Wrote: how did you captured the wlan password? I captured the wlan password with hcxdumptool. I'm using an older router that only supports 2.4GHz so I only have one password to change. RE: Getting previous router password when cracking - Snoopy - 03-16-2022 did you also deleted the hashcat potfile? im not quite sure on how hashcat stores already cracked wifi networks maybe it just stores the BSSID or MAC along wiht the pass and therefore maybe shows your "old" password RE: Getting previous router password when cracking - hashmando - 03-16-2022 (03-16-2022, 03:56 PM)Snoopy Wrote: did you also deleted the hashcat potfile? im not quite sure on how hashcat stores already cracked wifi networks maybe it just stores the BSSID or MAC along wiht the pass and therefore maybe shows your "old" password Yes I have tried deleting the hashcat potfile but I'm still getting the old password. RE: Getting previous router password when cracking - ZerBea - 03-16-2022 The nature of hcxdumptool is to retrieve all(!) passwords stored in the wpa-supplicant conf of a CLIENT. That include old passwords, the actual password and passwords of other NETWORKs the CLIENT was connected to. To identify the actual password I recommend to use hcxhashtool (--info=stdout) or to take a look at the message pair field at the end of the hash line as described here: https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2 Code: bitmask of message pair field: challenge = valid handshake that does not necessarily have to be part of the target ACCESS POINT authorized = valid handshake that allow access to the target ACCESS POINT BTW: Goal of hcxdumptool/hcxtools is hunting for weak CLIENTs. If one of your CLIENTs respond to an old password this CLIENT is weak! Check wpa-supplicant config of that CLIENT and remove this entry. RE: Getting previous router password when cracking - hashmando - 03-17-2022 Thank you my friend, your solution worked! RE: Getting previous router password when cracking - ZerBea - 03-17-2022 No problem, you're welcome. BTW: To test this weak point you can do this steps: Take a look at your stored WiFi NETWORKs of your smart phone. Add them to an essid.list. Look for a free WiFi channel (for the example we assume channel 9 is free). Run hcxdumptool with option essidlist and active_beacon: Code: $ sudo hcxdumptool -i YOUR_INTERFACE -c 9 --enable_status=31 -o dump.pcapng --essidlist=essid.list --active_beacon --stop_client_m2_attacks=1000 Wait a while (as long as the CLIENT respond, > 10 min). You should retrieve valid handshakes (M1M2 challenge) for every stored NETWORK of your smart phone's NETWORK list. In that case, the smart phone is vulnerable to this attack vector. |