06-24-2017, 08:47 PM
(06-20-2017, 10:25 AM)atom Wrote: Wait, 62^12 = 0xE5720EE830681000 so it's close to an integer overflow but it's not overflowing. Therefore hashcat is not warning.
Cracking a random WPA password with length 12 with upper, lower and digits is not possible. But the key here is "random". If the password contains words (even scrambled) you may can crack it using a wordlist. Another possibility is if the password was not changed on the AP. In that case it just looks random, but it isn't. It then can be cracked using a keygenerator for that AP type.
Interesting. Im just testing it on my home router. It has the default password on it, which is just random upper-lower-numbers. Would you have any links or resources regarding AP keygens? I'd be interested in trying it.