Took 15 days, but eventually got there 
![[Image: c6qEoSv.jpg]](http://i.imgur.com/c6qEoSv.jpg)
Using ATI Radeon HD 6990

![[Image: c6qEoSv.jpg]](http://i.imgur.com/c6qEoSv.jpg)
Using ATI Radeon HD 6990
WPA2 Success
|
Took 15 days, but eventually got there
![]() ![]() Using ATI Radeon HD 6990
12-04-2013, 03:23 PM
Good work,
Looks like you knew it was going to be 8 uppercase letters. What routers have this as the default? I like to write scripts for known passwords and filter out passwords guesses that are unlikely like in your example I doubt you would have all A's or even three A's in a row. I made one for 2wire routers: https://github.com/initiate6/2WIRE_BRUTEFORCE Pretty sure I could easily convert this over to uppercase char's. For password cracking rigs that get 200+MH/s might not be worth it but in your case it would have completed a lot faster.
12-04-2013, 04:20 PM
UK Sky Broadband Routers, 8 Chars long, all uppercase
UK BT Hub Routers also - 10 Chars long, 0-9, a-f e.g. - oclhashcat-plus64.exe -m 2500 -a 3 bt.hccap -1 ?dabcdef ?1?1?1?1?1?1?1?1?1?1 Takes too long though for my GPU ![]()
12-05-2013, 05:05 AM
(12-04-2013, 03:23 PM)init_6 Wrote: Good work,AFAIK, "./mp64.bin -q 3 ?d?d?d?d?d?d?d?d?d?d" would accomplish the same thing. But this only saves 6 minutes on a 7970. ~2 hours for CPU hashcat depending on the CPU. All based on crappy calculations I did a while back. |
« Next Oldest | Next Newest »
|