Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: Cracking a 30-digit hash (MD5)
Post: RE: Cracking a 30-digit hash (MD5)

If Moore's law holds, then all you need to do is build a time machine, travel to 2080 buy NVidia's latest offering, and bring it back. You'll probably need to plug it in to your 1.21 GW power supply, ...
drsnooker hashcat 3 2,821 04-27-2025, 03:30 AM
    Thread: Cracking a 30-digit hash (MD5)
Post: RE: Cracking a 30-digit hash (MD5)

A 5090 does 216e9 MD5 hashes per second. So a 10^30 MD5 would take 10^11 years to crack. Just a little bit longer than the age of the universe....
drsnooker hashcat 3 2,821 04-27-2025, 03:01 AM
    Thread: Verizon Fios G3100 and E3200 Research
Post: RE: Verizon Fios G3100 and E3200 Research

Nicely done. Not sure if this will be helpful, but PSKracker has a couple of netgear wordlists that might come in handy https://github.com/andrewjlamarche/PSKracker
drsnooker User Contributions 27 19,755 04-04-2025, 06:32 PM
    Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers

lookin_for_peace Wrote: (02-16-2025, 11:24 AM) -- Hello, I've been stuck for a while trying to understand the key generation of Compal CH7465LG (UPC/Vodafone Connect Box). I have gathered a bunch ...
drsnooker User Contributions 225 1,022,693 02-16-2025, 08:11 PM
    Thread: 5268ac routers
Post: RE: 5268ac routers

Perhaps if you purchase a used one of ebay, the FW might not have been upgraded past the point that you can change the firmware to an older one. Or perhaps downgrade to 11.0 first before going for 10....
drsnooker User Contributions 56 132,034 01-12-2025, 01:17 PM
    Thread: 5268ac routers
Post: RE: 5268ac routers

@b1tninja, I eventually got a clip and managed to get the NAND dumped in situ. However, since we know the root password as well as the algo for the password of user: rma (also with root privileges), ...
drsnooker User Contributions 56 132,034 01-12-2025, 11:37 AM
    Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers

Hacked together some c-code. Catches 17 out of the 19 dir605l passwords I've collected. It generates a 50G dictionary in about 20 minutes. There are quite a few identical passwords in the rainbow tabl...
drsnooker User Contributions 225 1,022,693 01-12-2025, 10:07 AM
    Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers

I think I got something to at least explain the above graphs. Take all values 0,1,2,3, .... 255 and look at the probabilities of each number occurring. Doesn't that look exactly like the probabilitie...
drsnooker User Contributions 225 1,022,693 01-12-2025, 04:58 AM
    Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers

Have Blue Wrote: (12-28-2024, 05:24 AM) -- One thing that struck me was the prevalence of the 'b' character versus 'a' which made me wonder if zeroes are for whatever reason much less likely to be ge...
drsnooker User Contributions 225 1,022,693 12-29-2024, 12:33 AM
    Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers

This is getting interesting. Perhaps a worthy foe? I ran all the variants I could think of from the 640L algo against the 605L and struck out. Some hits, but as you get with enough monkeys and type...
drsnooker User Contributions 225 1,022,693 12-27-2024, 08:22 PM
    Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers

Have Blue Wrote: (12-26-2024, 05:53 AM) -- This has probably already been discovered by others, but it looks like the first 5 characters only consist of a-j, so it seems to be an alpha substitution f...
drsnooker User Contributions 225 1,022,693 12-27-2024, 06:36 AM
    Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers

The d-link DIR-605L is likely pretty complicated. I managed to reverse the 640L. If you want to see how that's done check out Plums conversion to Python: https://github.com/PlumLulz/dir_640lpy
drsnooker User Contributions 225 1,022,693 12-26-2024, 08:28 PM
    Thread: Am I’d doing something wrong
Post: RE: Am I’d doing something wrong

Try a text file with just the password in it, to verify that's correct. Then delete the entry in the pot-file to run it again with rockyou.txt I think it's important that there's at least a linefeed ...
drsnooker hashcat 2 2,069 11-18-2024, 04:41 AM
    Thread: Any Other ways of cracking Wpa2
Post: RE: Any Other ways of cracking Wpa2

Good job getting this far, there's always lot more to learn with this hobby! I'm thinking most of us got started with K_a_l_i and wifite, but the tools have gotten much better since then. Not in the l...
drsnooker hashcat 15 18,136 08-01-2024, 01:32 AM
    Thread: Any Other ways of cracking Wpa2
Post: RE: Any Other ways of cracking Wpa2

The uncleaned file sometimes contains the brand name and model (and even serial numbers) hence that can be important. 16 char password is not reasonable to brute force within a lifetime. I looked ...
drsnooker hashcat 15 18,136 07-30-2024, 07:19 PM
    Thread: Any Other ways of cracking Wpa2
Post: RE: Any Other ways of cracking Wpa2

Welcome to the forum! Do you know the brand name and model of the router? The other way around it, is to find the keygen algorithm for it. This can be possible for certain brands that kindly inclu...
drsnooker hashcat 15 18,136 07-30-2024, 01:16 AM
    Thread: Splitting work to pass through the integer overflow error
Post: RE: Splitting work to pass through the integer ove...

You could manually split the mask into multiple runs (if you have the hardware to complete the task before the heat death of the universe) by say fixing the first char of the mask. a?a?a?a?a?a?a?a?a?...
drsnooker hashcat 7 8,101 04-25-2024, 09:06 PM
    Thread: Determine WPA2
Post: RE: Determine WPA2

Did you try opening the WILLY.hccapx in a text editor? The hashes should look like the 22000 mode hashes. The exact same lengths, number of characters between '*' etc. https://hashcat.net/wiki/doku...
drsnooker hashcat 4 7,138 03-10-2024, 10:55 PM
    Thread: Determine WPA2
Post: RE: Determine WPA2

WPA2 requires mode 22000 -m 22000 (you're using MD5 mode 0) You might have to convert your cap to 22000 format: https://hashcat.net/cap2hashcat/ ./hashcat-src/hashcat -d 1 -m 22000 -a 0 WILLY.hc...
drsnooker hashcat 4 7,138 03-10-2024, 09:34 PM
    Thread: Brute forcing WPA2 becoming impossible?
Post: RE: Brute forcing WPA2 becoming impossible?

Yeah it's getting more difficult. Moderator: perhaps merge with this thread? https://hashcat.net/forum/thread-11648.html
drsnooker General Talk 7 13,839 03-10-2024, 08:00 PM