WPA PMKID password SAGEM 12 char small letters?
#1
Hi
Is there a way to crack a 12 digit password comprised of small alphabets in a faster way? I got PMKID and know the password is 12 character all comprised of small letters. When hashcat is run normally says 10 years. Lets say the modem is Sagem, would anything known make it faster than the traditional way?12digits are random with no patterns.

I mean instead of brute force, would it be better to make a 12digit wordlist or something similar? Or would it be the same? Is there any other method?
Reply
#2
https://hashcat.net/forum/thread-6170.html

Lots of modems have keygens, could always look for an available keygen if it has been provided. Otherwise, no changing from a bruteforce to a wordlist for a 12 character password comprised of just lowercase alpha would not increase your attack speed/shorten your attack time.

Quick edit: You can always see if the modem is vulnerable to pixiedust WPS attack as well.
Reply
#3
Thanks slyexe for this one. I tried Pixie but sadly didnt work.

Is it possible that a .22000 file would not have a prefix of WPA*? I see in some files they have and others don't. is it corruption or a different format?

Thanks
Reply
#4
(04-23-2023, 03:40 AM)roooooob Wrote: Thanks slyexe for this one. I tried Pixie but sadly  didnt work.

Is it possible that a .22000 file would not have a prefix of WPA*? I see in some files they have and others don't. is it corruption or a different format?

Thanks

By the sounds of things, you have an older format of 16800. If you do not apply an mode to your attack it will automatically determine what type of hash it is, or attempt. Otherwise, you will have to isolate each mode from the hashfile.

https://hashcat.net/wiki/doku.php?id=example_hashes

See modes 2500 (old), 16800 (old), and 22000 (new) to see which your hashes correlate too.
Reply
#5
Thanks
Reply