07-12-2017, 03:56 AM
Keyspace List for WPA on Default Routers
|
07-13-2017, 03:10 AM
I've been testing the python code for the 599 generator.
So far, the hit rate is 100 percent. The one code that wasn't calculated correctly with the generator for the 589 was correctly calculated with the python code for the 599. Between the python for the 599 and the C for the 589, every passphrase that I have tested has been calculated correctly. Will the python for the 599 gen be ported to C? Also, bravo, sir. Well done. Is it possible that a similar method is being used for ATTXXXX devices? [0-9,A-Z] len 10
07-13-2017, 03:36 AM
I will work on the 599 code when I get more time. Not sure of ATTxxxx
07-13-2017, 08:54 PM
(07-12-2017, 02:52 AM)devilsadvocate Wrote: Regarding the 2 that were almost correctly calculated, the passphrase with the exception of the last 2 characters were guessed correctly, but the last 2 characters were wrong. A workaround is to come up with a rule that can truncate the last 2 characters and brute force positions 11 and 12. Either that or adjust the code as necessary. The following should calculate the 2 which were "almost" correct: Code: def pwgen589_alt(x): I haven't seen any actual ATTxxxx passwords. I'm not even sure if they are associated with Arris or Pace hardware. If they are from Arris, the method should be similar.
07-13-2017, 11:08 PM
gcc att.c to build, then ./a.out to run. Will take a good amount of time to generate all possibilities but you should be able to pipe directly into hashcat if I'm not mistaken. Haven't actually tested though.
07-14-2017, 01:30 AM
(This post was last modified: 07-14-2017, 01:33 AM by soxrok2212.)
Might be something with your PC, perhaps it can't handle the output? Try changing INT_MAX on line 30 to a smaller number like 50, recompile, and see if the output changes. Having no issues on my end, though I am using a more fully featured version that I will push tonight
07-14-2017, 03:26 AM
(This post was last modified: 07-14-2017, 11:36 AM by soxrok2212.)
Updated! https://github.com/soxrok2212/PSKracker
Simply run gcc att.c -o att to compile, then run with ./att -m nvg589 I'll do my best to port the 599 code as soon as I can. Any bugs or comments please let me know! It is still very unfinished so I'm sure there will be issues.
07-15-2017, 02:47 AM
(This post was last modified: 07-15-2017, 09:06 PM by soxrok2212.)
(07-14-2017, 09:25 PM)fart-box Wrote: Soxrok2212, I hope you will impliment the NVG599 code into your keygen as soon as possible, and when you do, I think you should give Mrfancypants a very special acknowledgement for all the hard work he's done locating these "magic numbers" and providing us with the Python code which made your keygen possible! I will implement the 599 code when I have some time. And yes, I will credit mrfancypants and link to this thread. It is already in the next push but I haven't done it yet EDIT: Updated acknowledgements and cleaned up code a bit. I will wait for mrfancypants' final Python code before I start on the C code to get the cleanest product possible. And sorry for my less than adequate coding skills, it's new to me too
07-16-2017, 03:11 AM
(07-16-2017, 12:58 AM)fart-box Wrote: Thank you, Soxrok2212! And you first attempt at 'C' worked perfectly for me the second time around. I'm sure I messed something up on my first attempt. At this time, the code that exists is: The source for the 589 (written in C). The source for the 599 (written in Python). The python code for the 599 is functional, but it is very memory hungry. One of the workarounds is to give it at least one character on the line that says "candidates=pw_to_candidate_ints" (this is line 24). Example: candidates=pw_to_candidate_ints('2') This will generate all passwords that start with '2'. If the python for the 599 code was hanging and not executing, I experienced the same behavior and this workaround enabled the generation of the desired passwords. For the 599 python code, you will have to increment that line, line 24, in order to get the equivalent dictionary file. You will have to do that 37 times (the characters that can be seen on line 1) in order to get all of the possible passwords. This will soon become unnecessary. The C code for the 599 is coming. If you need more basic assistance, then you should know that a .py file has to be executed like: python nvg599.py The C code should be compiled with gcc like: gcc nvg589.c -o nvg589.bin Hope this helps.
07-16-2017, 05:52 PM
|
« Next Oldest | Next Newest »
|