Bruteforcing wpa2 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html) +--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html) +--- Thread: Bruteforcing wpa2 (/thread-1211.html) |
Bruteforcing wpa2 - humbug - 05-26-2012 Might be stupid for even trying to crack this but, Password is 10 chars, upercase and digits. using mask ?du?du?du?du?du?du?du?du?du?du is that the correct mask for this? even worth trying to crack? :p RE: Bruteforcing wpa2 - M@LIK - 05-26-2012 *hard_facepalm* RE: Bruteforcing wpa2 - forumhero - 05-26-2012 check out the wiki http://hashcat.net/wiki/mask_attack RE: Bruteforcing wpa2 - undeath - 05-26-2012 even if you figure out the correct mask, forget about it. RE: Bruteforcing wpa2 - Hash-IT - 05-26-2012 Hi humbug It sounds as if you are confident that the password contains the number of characters you state. If this is so I suspect you assume that the password is a default one set by the ISP and hasn’t been changed by the customer. If this is so then there is possibly a way to narrow it down further. I have noticed that when a manufacturer generates a password more often than not if it is <9 characters they use full alpha – numeric, however as they get longer some only use abcdef0123456789. You need to see a genuine password for the same manufacturer to confirm this. Even if your target does only use abcdef0123456789, trying to brute force a password of 10 characters even using the reduced possibilities will take a very long time unless you have a lot of very powerful GPU’s. Take a look at this thread as it aims to help this problem. I must point out though that even optimising (as in the link) it will still take a very long time. Have you considered “Reaver†? RE: Bruteforcing wpa2 - humbug - 05-26-2012 (05-26-2012, 11:25 AM)Hash-IT Wrote: Hi humbugYes you are correct. its a default ISP password Yea i got one: CEFA905B41 Accually forgot about reaver. Not sure if they got WPS on by default doh. Gonna check that. RE: Bruteforcing wpa2 - Hash-IT - 05-26-2012 (05-26-2012, 09:07 PM)humbug Wrote: Yes you are correct. Thats good, you could be really cheeky and take a chance that the mask pattern might be the same as the one you are testing. ?u?u?u?u?d?d?d?u?d?d but it is unlikely. Have you noticed that the code you have is made from abcdef0123456789 ? Just a suggestion thats all. (05-26-2012, 09:07 PM)humbug Wrote: Accually forgot about reaver. Always pick the low hanging fruit first !!! (05-26-2012, 09:07 PM)humbug Wrote: Not sure if they got WPS on by default doh. Of course you will just be able to ask them as they have obviously employed you to test it for them, so they should be more than willing to tell you. .... hmmm ? |