11-22-2014, 03:25 PM
Hi guys, long time lurker, first time poster.
I have a question about dictionaries that has come up from some investigating netgear routers with WPA2-PSK.
The default SSID is often NETGEARXXX
The default password on these devices (at least where I live) is 2 english works with a 3 digit number on the end all in lower case.
The English language is reasonably small (around 1 million individual words)
Is there a way I can run 2 English dictionaries (the same dictionary!) against each other then add the numbers at the end
Ie:
Dictionary 1:
dog
cat
table
Dictionary 2:
dog
cat
table
To give an output like:
dogdog001
dogdog002
.
.
.
dogcat001
dogcat002
.
.
dogtable001
dogtable002
.
.
And so on.
at 500kh/s that my home rig is capable of with oclhashcat, I am expecting a total crack time of around 20 days---does this soudn correct?
Also is there a way to eliminate combinations that would not meet wpa rules of 8 character minimum to save on crack time?
Your help is greatly appreciated
I have a question about dictionaries that has come up from some investigating netgear routers with WPA2-PSK.
The default SSID is often NETGEARXXX
The default password on these devices (at least where I live) is 2 english works with a 3 digit number on the end all in lower case.
The English language is reasonably small (around 1 million individual words)
Is there a way I can run 2 English dictionaries (the same dictionary!) against each other then add the numbers at the end
Ie:
Dictionary 1:
dog
cat
table
Dictionary 2:
dog
cat
table
To give an output like:
dogdog001
dogdog002
.
.
.
dogcat001
dogcat002
.
.
dogtable001
dogtable002
.
.
And so on.
at 500kh/s that my home rig is capable of with oclhashcat, I am expecting a total crack time of around 20 days---does this soudn correct?
Also is there a way to eliminate combinations that would not meet wpa rules of 8 character minimum to save on crack time?
Your help is greatly appreciated