10-01-2018, 01:12 PM
No need to run rockyou against your hash. This list is included in the dictionaries of: https://wpa-sec.stanev.org/?dicts
You can upload your cap (using wlancap2wpasec or web interface). If the password is found, you will find it in cracked.txt. In this case you doesn't waste time testing common wordlists, because wpa-sec will do this for you. Now you can try other wordlists:
https://github.com/zecopro/wpa-passwords
https://hashes.org/left.php
http://wordbook.xyz/download/wifi/3wifi-wordlist.rar
read more about this wordlist here:
https://forum.antichat.ru/threads/281655/page-104
You can try wlanhcx2psk and/or hcxpsktool (will give you some weak password candidates).
You can get VENDOR information from mac_ap (using whoismac) and/or ISP (from default ESSID) and search for default key space.
You can upload your cap (using wlancap2wpasec or web interface). If the password is found, you will find it in cracked.txt. In this case you doesn't waste time testing common wordlists, because wpa-sec will do this for you. Now you can try other wordlists:
https://github.com/zecopro/wpa-passwords
https://hashes.org/left.php
http://wordbook.xyz/download/wifi/3wifi-wordlist.rar
read more about this wordlist here:
https://forum.antichat.ru/threads/281655/page-104
You can try wlanhcx2psk and/or hcxpsktool (will give you some weak password candidates).
You can get VENDOR information from mac_ap (using whoismac) and/or ISP (from default ESSID) and search for default key space.