Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Cracking a 30-digit hash (MD5)
Post: RE: Cracking a 30-digit hash (MD5)
If Moore's law holds, then all you need to do is build a time machine, travel to 2080 buy NVidia's latest offering, and bring it back. You'll probably need to plug it in to your 1.21 GW power supply, ... |
|
drsnooker |
hashcat
|
3 |
2,821 |
04-27-2025, 03:30 AM |
|
|
Thread: Cracking a 30-digit hash (MD5)
Post: RE: Cracking a 30-digit hash (MD5)
A 5090 does 216e9 MD5 hashes per second.
So a 10^30 MD5 would take 10^11 years to crack. Just a little bit longer than the age of the universe.... |
|
drsnooker |
hashcat
|
3 |
2,821 |
04-27-2025, 03:01 AM |
|
|
Thread: Verizon Fios G3100 and E3200 Research
Post: RE: Verizon Fios G3100 and E3200 Research
Nicely done. Not sure if this will be helpful, but PSKracker has a couple of netgear wordlists that might come in handy
https://github.com/andrewjlamarche/PSKracker |
|
drsnooker |
User Contributions
|
27 |
19,755 |
04-04-2025, 06:32 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
lookin_for_peace Wrote: (02-16-2025, 11:24 AM)
--
Hello,
I've been stuck for a while trying to understand the key generation of Compal CH7465LG (UPC/Vodafone Connect Box). I have gathered a bunch ... |
|
drsnooker |
User Contributions
|
225 |
1,022,693 |
02-16-2025, 08:11 PM |
|
|
Thread: 5268ac routers
Post: RE: 5268ac routers
Perhaps if you purchase a used one of ebay, the FW might not have been upgraded past the point that you can change the firmware to an older one. Or perhaps downgrade to 11.0 first before going for 10.... |
|
drsnooker |
User Contributions
|
56 |
132,034 |
01-12-2025, 01:17 PM |
|
|
Thread: 5268ac routers
Post: RE: 5268ac routers
@b1tninja, I eventually got a clip and managed to get the NAND dumped in situ. However, since we know the root password as well as the algo for the password of user: rma (also with root privileges), ... |
|
drsnooker |
User Contributions
|
56 |
132,034 |
01-12-2025, 11:37 AM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
Hacked together some c-code. Catches 17 out of the 19 dir605l passwords I've collected. It generates a 50G dictionary in about 20 minutes. There are quite a few identical passwords in the rainbow tabl... |
|
drsnooker |
User Contributions
|
225 |
1,022,693 |
01-12-2025, 10:07 AM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
I think I got something to at least explain the above graphs.
Take all values 0,1,2,3, .... 255 and look at the probabilities of each number occurring. Doesn't that look exactly like the probabilitie... |
|
drsnooker |
User Contributions
|
225 |
1,022,693 |
01-12-2025, 04:58 AM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
Have Blue Wrote: (12-28-2024, 05:24 AM)
--
One thing that struck me was the prevalence of the 'b' character versus 'a' which made me wonder if zeroes are for whatever reason much less likely to be ge... |
|
drsnooker |
User Contributions
|
225 |
1,022,693 |
12-29-2024, 12:33 AM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
This is getting interesting. Perhaps a worthy foe?
I ran all the variants I could think of from the 640L algo against the 605L and struck out. Some hits, but as you get with enough monkeys and type... |
|
drsnooker |
User Contributions
|
225 |
1,022,693 |
12-27-2024, 08:22 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
Have Blue Wrote: (12-26-2024, 05:53 AM)
--
This has probably already been discovered by others, but it looks like the first 5 characters only consist of a-j, so it seems to be an alpha substitution f... |
|
drsnooker |
User Contributions
|
225 |
1,022,693 |
12-27-2024, 06:36 AM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
The d-link DIR-605L is likely pretty complicated. I managed to reverse the 640L. If you want to see how that's done check out Plums conversion to Python:
https://github.com/PlumLulz/dir_640lpy |
|
drsnooker |
User Contributions
|
225 |
1,022,693 |
12-26-2024, 08:28 PM |
|
|
Thread: Am I’d doing something wrong
Post: RE: Am I’d doing something wrong
Try a text file with just the password in it, to verify that's correct. Then delete the entry in the pot-file to run it again with rockyou.txt
I think it's important that there's at least a linefeed ... |
|
drsnooker |
hashcat
|
2 |
2,069 |
11-18-2024, 04:41 AM |
|
|
Thread: Any Other ways of cracking Wpa2
Post: RE: Any Other ways of cracking Wpa2
Good job getting this far, there's always lot more to learn with this hobby! I'm thinking most of us got started with K_a_l_i and wifite, but the tools have gotten much better since then. Not in the l... |
|
drsnooker |
hashcat
|
15 |
18,136 |
08-01-2024, 01:32 AM |
|
|
Thread: Any Other ways of cracking Wpa2
Post: RE: Any Other ways of cracking Wpa2
The uncleaned file sometimes contains the brand name and model (and even serial numbers) hence that can be important.
16 char password is not reasonable to brute force within a lifetime.
I looked ... |
|
drsnooker |
hashcat
|
15 |
18,136 |
07-30-2024, 07:19 PM |
|
|
Thread: Any Other ways of cracking Wpa2
Post: RE: Any Other ways of cracking Wpa2
Welcome to the forum! Do you know the brand name and model of the router?
The other way around it, is to find the keygen algorithm for it. This can be possible for certain brands that kindly inclu... |
|
drsnooker |
hashcat
|
15 |
18,136 |
07-30-2024, 01:16 AM |
|
|
Thread: Splitting work to pass through the integer overflow error
Post: RE: Splitting work to pass through the integer ove...
You could manually split the mask into multiple runs (if you have the hardware to complete the task before the heat death of the universe) by say fixing the first char of the mask.
a?a?a?a?a?a?a?a?a?... |
|
drsnooker |
hashcat
|
7 |
8,101 |
04-25-2024, 09:06 PM |
|
|
Thread: Determine WPA2
Post: RE: Determine WPA2
Did you try opening the WILLY.hccapx in a text editor?
The hashes should look like the 22000 mode hashes. The exact same lengths, number of characters between '*' etc.
https://hashcat.net/wiki/doku... |
|
drsnooker |
hashcat
|
4 |
7,138 |
03-10-2024, 10:55 PM |
|
|
Thread: Determine WPA2
Post: RE: Determine WPA2
WPA2 requires mode 22000 -m 22000 (you're using MD5 mode 0)
You might have to convert your cap to 22000 format:
https://hashcat.net/cap2hashcat/
./hashcat-src/hashcat -d 1 -m 22000 -a 0 WILLY.hc... |
|
drsnooker |
hashcat
|
4 |
7,138 |
03-10-2024, 09:34 PM |
|
|
Thread: Brute forcing WPA2 becoming impossible?
Post: RE: Brute forcing WPA2 becoming impossible?
Yeah it's getting more difficult.
Moderator: perhaps merge with this thread?
https://hashcat.net/forum/thread-11648.html |
|
drsnooker |
General Talk
|
7 |
13,839 |
03-10-2024, 08:00 PM |