Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Any Other ways of cracking Wpa2
Post: RE: Any Other ways of cracking Wpa2
Good job getting this far, there's always lot more to learn with this hobby! I'm thinking most of us got started with K_a_l_i and wifite, but the tools have gotten much better since then. Not in the l... |
|
drsnooker |
hashcat
|
15 |
3,540 |
08-01-2024, 01:32 AM |
|
|
Thread: Any Other ways of cracking Wpa2
Post: RE: Any Other ways of cracking Wpa2
The uncleaned file sometimes contains the brand name and model (and even serial numbers) hence that can be important.
16 char password is not reasonable to brute force within a lifetime.
I looked ... |
|
drsnooker |
hashcat
|
15 |
3,540 |
07-30-2024, 07:19 PM |
|
|
Thread: Any Other ways of cracking Wpa2
Post: RE: Any Other ways of cracking Wpa2
Welcome to the forum! Do you know the brand name and model of the router?
The other way around it, is to find the keygen algorithm for it. This can be possible for certain brands that kindly inclu... |
|
drsnooker |
hashcat
|
15 |
3,540 |
07-30-2024, 01:16 AM |
|
|
Thread: Splitting work to pass through the integer overflow error
Post: RE: Splitting work to pass through the integer ove...
You could manually split the mask into multiple runs (if you have the hardware to complete the task before the heat death of the universe) by say fixing the first char of the mask.
a?a?a?a?a?a?a?a?a?... |
|
drsnooker |
hashcat
|
7 |
3,015 |
04-25-2024, 09:06 PM |
|
|
Thread: Determine WPA2
Post: RE: Determine WPA2
Did you try opening the WILLY.hccapx in a text editor?
The hashes should look like the 22000 mode hashes. The exact same lengths, number of characters between '*' etc.
https://hashcat.net/wiki/doku... |
|
drsnooker |
hashcat
|
4 |
3,600 |
03-10-2024, 10:55 PM |
|
|
Thread: Determine WPA2
Post: RE: Determine WPA2
WPA2 requires mode 22000 -m 22000 (you're using MD5 mode 0)
You might have to convert your cap to 22000 format:
https://hashcat.net/cap2hashcat/
./hashcat-src/hashcat -d 1 -m 22000 -a 0 WILLY.hc... |
|
drsnooker |
hashcat
|
4 |
3,600 |
03-10-2024, 09:34 PM |
|
|
Thread: Brute forcing WPA2 becoming impossible?
Post: RE: Brute forcing WPA2 becoming impossible?
Yeah it's getting more difficult.
Moderator: perhaps merge with this thread?
https://hashcat.net/forum/thread-11648.html |
|
drsnooker |
General Talk
|
7 |
6,555 |
03-10-2024, 08:00 PM |
|
|
Thread: WiFi WPA2 - 16alphanumerical
Post: RE: WiFi WPA2 - 16alphanumerical
Ah, the integer overflow error... Struggled with that myself.
Perhaps a change in error message might be helpful????
Like: "Used mask has too many entries" or "number of permutations of the used ... |
|
drsnooker |
hashcat
|
6 |
4,773 |
01-24-2024, 08:27 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
brahim7 Wrote: (01-10-2024, 10:09 AM)
--
So , how we get password list by these funtions?
--
A small python script to loop thru a range of serial numbers would work for most of these. |
|
drsnooker |
User Contributions
|
213 |
865,774 |
01-10-2024, 07:58 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
January 2024 update for all the found Zyxel modem keygens. (deleted the previous tables to keep the thread clean)
https://i.imgur.com/YVGAAJ9.jpg |
|
drsnooker |
User Contributions
|
213 |
865,774 |
01-08-2024, 06:59 AM |
|
|
Thread: 5268ac routers
Post: RE: 5268ac routers
This pace edition is straight from the factory! I've got root access over UART. And check out the /usr/bin directory.... factory_set_default_wifi_passwd!
*sad trombone* It's just a script to pull the... |
|
drsnooker |
User Contributions
|
52 |
95,119 |
12-29-2023, 06:47 AM |
|
|
Thread: 5268ac routers
Post: RE: 5268ac routers
Look at what Santa left in my stocking!!!!
https://i.imgur.com/r6Bt8OL.jpg
Let's crack it open and see if its firmware contains any mysteries.... |
|
drsnooker |
User Contributions
|
52 |
95,119 |
12-23-2023, 09:37 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
brahim7 Wrote: (12-12-2023, 12:10 PM)
--
Normal firmware from website or that who extracted by special tools?
--
The firmware from various websites that do include a "reset to factory defaults" fun... |
|
drsnooker |
User Contributions
|
213 |
865,774 |
12-12-2023, 08:03 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
But if you do find a ZTE (or Huawei) firmware that does include the keygen, please post it here. A lot of people are interested in them! |
|
drsnooker |
User Contributions
|
213 |
865,774 |
12-11-2023, 08:30 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
Last I looked ZTE does not include their keygen in the firmware. Next to impossible to guess the hashing mechanism without it. |
|
drsnooker |
User Contributions
|
213 |
865,774 |
12-09-2023, 05:52 AM |
|
|
Thread: Integer overflow detected in keyspace of wordlist
Post: RE: Integer overflow detected in keyspace of wordl...
Faber Wrote: (11-19-2023, 11:41 PM)
--
In my case it's not the solution. 12 chars working if alone, but stop to work when I add a fix part that don't going to exceede the limit.
Ex:
.\hashcat.exe... |
|
drsnooker |
hashcat
|
7 |
10,249 |
11-19-2023, 11:51 PM |
|
|
Thread: Integer overflow detected in keyspace of wordlist
Post: RE: Integer overflow detected in keyspace of wordl...
Perhaps I'll repeat my previous comments for the developer to catch this particular error and print a different message....
drsnooker Wrote: (10-17-2022, 07:16 PM)
--
Perhaps a change in error mes... |
|
drsnooker |
hashcat
|
7 |
10,249 |
11-19-2023, 10:50 PM |
|
|
Thread: About WIFI WPA
Post: RE: About WIFI WPA
One alternative is to find default password generating algorithm.
https://hashcat.net/forum/thread-6170-post-58551.html#pid58551
https://github.com/soxrok2212/PSKracker |
|
drsnooker |
hashcat
|
2 |
4,081 |
10-07-2023, 02:23 AM |
|
|
Thread: 5268ac routers
Post: RE: 5268ac routers
A nice even 1000 passwords for the 5268AC. I think this is a good place to leave it, unless anybody has any more ideas...
https://pastebin.com/22ZGhHg4 |
|
drsnooker |
User Contributions
|
52 |
95,119 |
10-01-2023, 10:28 PM |
|
|
Thread: hashing\encoding algorithm determination help request
Post: RE: hashing\encoding algorithm determination help ...
Yeah, reverse engineering would be the ticket.
This algorithm behaves similar to Pseudopassword by 90h on the PACE 5268ac. See link below what such an algo could look like in python.
Not mathematica... |
|
drsnooker |
hashcat
|
5 |
6,305 |
09-11-2023, 09:12 PM |