06-12-2023, 08:32 AM
A big basic word list & rules result in a huge word list. PBKDF2 is a slow algo. Running such a big word list will take a lot of time.
Usually I break down -R output of hcxpcapngtool:
hcxdumptool -> hcxpcapngtool -> hcxeiutool -> hashcat & rules
The same can be done on
https://wpa-sec.stanev.org/dict/cracked.txt.gz
and the tiny list of
https://hashmob.net/resources/hashmob
Please notice, that you have to pre-process the word lists mentioned above before you add rules:
break down ito basic words
remove improbable words
Please also notice that this procedure only works on user defined PSKs.
On default PSKs you have to discover the key space and/or a pattern.
Complex long default PSKs are unbreakable if you don't know the algo how they are calculated.
In some cases it it might be possible to find them in the WiFi traffic:
https://github.com/evilsocket/pwnagotchi...-598597214
Usually I break down -R output of hcxpcapngtool:
hcxdumptool -> hcxpcapngtool -> hcxeiutool -> hashcat & rules
The same can be done on
https://wpa-sec.stanev.org/dict/cracked.txt.gz
and the tiny list of
https://hashmob.net/resources/hashmob
Please notice, that you have to pre-process the word lists mentioned above before you add rules:
break down ito basic words
remove improbable words
Please also notice that this procedure only works on user defined PSKs.
On default PSKs you have to discover the key space and/or a pattern.
Complex long default PSKs are unbreakable if you don't know the algo how they are calculated.
In some cases it it might be possible to find them in the WiFi traffic:
https://github.com/evilsocket/pwnagotchi...-598597214