Bruteforcing wpa2
#6
(05-26-2012, 11:25 AM)Hash-IT Wrote: Hi humbug

It sounds as if you are confident that the password contains the number of characters you state. If this is so I suspect you assume that the password is a default one set by the ISP and hasn’t been changed by the customer.

If this is so then there is possibly a way to narrow it down further. I have noticed that when a manufacturer generates a password more often than not if it is <9 characters they use full alpha – numeric, however as they get longer some only use abcdef0123456789. You need to see a genuine password for the same manufacturer to confirm this.

Even if your target does only use abcdef0123456789, trying to brute force a password of 10 characters even using the reduced possibilities will take a very long time unless you have a lot of very powerful GPU’s.

Take a look at this thread as it aims to help this problem. I must point out though that even optimising (as in the link) it will still take a very long time.

Have you considered “Reaver” ?
Yes you are correct.
its a default ISP password
Yea i got one:
CEFA905B41

Accually forgot about reaver.
Not sure if they got WPS on by default doh.
Gonna check that.


Messages In This Thread
Bruteforcing wpa2 - by humbug - 05-26-2012, 06:10 AM
RE: Bruteforcing wpa2 - by M@LIK - 05-26-2012, 06:13 AM
RE: Bruteforcing wpa2 - by forumhero - 05-26-2012, 09:40 AM
RE: Bruteforcing wpa2 - by undeath - 05-26-2012, 09:57 AM
RE: Bruteforcing wpa2 - by Hash-IT - 05-26-2012, 11:25 AM
RE: Bruteforcing wpa2 - by humbug - 05-26-2012, 09:07 PM
RE: Bruteforcing wpa2 - by Hash-IT - 05-26-2012, 10:10 PM