Tactic for cracking WPA password
#8
A big basic word list & rules result in a huge word list. PBKDF2 is a slow algo. Running such a big word list will take a lot of time.
Usually I break down -R output of hcxpcapngtool:
hcxdumptool -> hcxpcapngtool -> hcxeiutool -> hashcat & rules

The same can be done on
https://wpa-sec.stanev.org/dict/cracked.txt.gz
and the tiny list of
https://hashmob.net/resources/hashmob

Please notice, that you have to pre-process the word lists mentioned above before you add rules:
break down ito basic words
remove improbable words

Please also notice that this procedure only works on user defined PSKs.

On default PSKs you have to discover the key space and/or a pattern.

Complex long default PSKs are unbreakable if you don't know the algo how they are calculated.
In some cases it it might be possible to find them in the WiFi traffic:
https://github.com/evilsocket/pwnagotchi...-598597214
Reply


Messages In This Thread
RE: Tactic for cracking WPA password - by marc1n - 06-02-2023, 09:55 PM
RE: Tactic for cracking WPA password - by powermi - 06-03-2023, 07:02 AM
RE: Tactic for cracking WPA password - by ZerBea - 06-03-2023, 07:59 AM
RE: Tactic for cracking WPA password - by se7enge - 06-10-2023, 11:55 PM
RE: Tactic for cracking WPA password - by ZerBea - 06-11-2023, 07:40 PM
RE: Tactic for cracking WPA password - by se7enge - 06-12-2023, 12:42 AM
RE: Tactic for cracking WPA password - by ZerBea - 06-12-2023, 08:32 AM
RE: Tactic for cracking WPA password - by se7enge - 06-13-2023, 02:41 PM
RE: Tactic for cracking WPA password - by ZerBea - 06-13-2023, 10:41 PM