No devices found/left
#9
(01-26-2019, 04:11 AM)slyexe Wrote: Easiest solution is to look for keygens already made for the type of router you're attempting to attack first. Afterwards search default passwords to find common lengths used and the keyspace they use(alpha numeric, special chars, etc.) Once you have some filters made you can separate your PMKID's based on router brands and run individual attacks. This is my process anyway, can usually crack most routers here within 5 minutes @ 350K h/s. Otherwise, using simple wordlist with best64.rule usually covers the rest which were missed. 

The trick is to eliminate as much as you can before running an attack, the smaller the keyspace and more accurate it is the faster your results. 

here's a good place to start:
https://hashcat.net/forum/thread-6170.html

Yeah this will help a whole lot, thanks bro. What sucks is if you don't know the brand of the router your attacking, your back to square one.
Reply


Messages In This Thread
No devices found/left - by Bully0423 - 01-25-2019, 05:54 AM
RE: No devices found/left - by royce - 01-25-2019, 07:08 AM
RE: No devices found/left - by Bully0423 - 01-25-2019, 10:31 AM
RE: No devices found/left - by philsmd - 01-25-2019, 11:19 AM
RE: No devices found/left - by Bully0423 - 01-25-2019, 12:14 PM
RE: No devices found/left - by slyexe - 01-25-2019, 08:39 PM
RE: No devices found/left - by Bully0423 - 01-25-2019, 11:21 PM
RE: No devices found/left - by slyexe - 01-26-2019, 04:11 AM
RE: No devices found/left - by Bully0423 - 01-26-2019, 10:11 AM
RE: No devices found/left - by slyexe - 01-27-2019, 06:43 PM