ESSID:key available lists?
#1
Dear HashCat community,

does anybody know where can I find a list of "ESSID:key" cracked WPA2 hashes?
I'm planning to do research with Generative Adversarial neural networks that output probable password candidates based on ESSID of the access point. As you could imagine, I need a large list.

Thank you.
Reply
#2
You can start with https://wpa-sec.stanev.org/?dicts
Reply
#3
See https://hashcat.net/forum/thread-6170.html

Given that default passwords for wpa routers are usually generated using some pseudo-random hashing function I wouldn't expect an AI to create much useful data.
Reply
#4
(06-28-2020, 03:40 PM)undeath Wrote: See https://hashcat.net/forum/thread-6170.html

Given that default passwords for wpa routers are usually generated using some pseudo-random hashing function I wouldn't expect an AI to create much useful data.

Yes, I'm looking for passwords created by humans for their wpa routers. Default passwords won't work.
Thank you for the link though, I was not aware of this.
Reply
#5
(06-28-2020, 02:22 PM)Mem5 Wrote: You can start with https://wpa-sec.stanev.org/?dicts

But those dict files don't contain SSIDs, do they? I need 
Code:
SSID:key
pairs.
Reply
#6
Hum. So you are looking at relationships between ESSID and passwords, but you are only interested in passwords created by humans?
IMHO human generated passwords have almost no relationships with ESSID, apart maybe essid==password but you don't need AI for that.
Human passwords are (pet) names, birthdates, etc.
Reply
#7
(07-02-2020, 07:39 PM)Mem5 Wrote: Hum. So you are looking at relationships between ESSID and passwords, but you are only interested in passwords created by humans?
IMHO human generated passwords have almost no relationships with ESSID, apart maybe essid==password but you don't need AI for that.
Human passwords are (pet) names, birthdates, etc.

If you're right, the project doesn't make sense after all. I do find cases when a key consists of shuffled word compounds of SSID joined with a symbol or peppered with a simple prefix or suffix. They are not essid==password but typical rules rule them out... and they are rare, I agree. I'd be interested to look deeply into these relations to craft more useful rules.

Besides this, I argue that sometimes there is information in ESSID. If not a plain key, it shifts the probability distribution of favorable candidates to one peak or another. For example, an AP with "TurTelekom_Z4Ry" SSID typically won't use pet names unless the director is a funny man. While APs with SSID "Svetlanochka" have proven to use (pet) names as passwords. Training the distribution of such most likely words could be a good candidate for AI.
Reply