Posts: 20
	Threads: 4
	Joined: Nov 2017
	
	
 
	
		
		
		06-28-2020, 11:11 AM 
(This post was last modified: 06-28-2020, 11:12 AM by dizcza.)
		
	 
	
		Dear HashCat community,
does anybody know where can I find a list of "ESSID:key" cracked WPA2 hashes?
I'm planning to do research with Generative Adversarial neural networks that output probable password candidates based on ESSID of the access point. As you could imagine, I need a large list.
Thank you.
	
	
	
	
	
 
 
	
	
	
		
	Posts: 803
	Threads: 135
	Joined: Feb 2011
	
	
 
 
	
	
	
		
	Posts: 2,301
	Threads: 11
	Joined: Jul 2010
	
	
 
	
	
		See 
https://hashcat.net/forum/thread-6170.html
Given that default passwords for wpa routers are usually generated using some pseudo-random hashing function I wouldn't expect an AI to create much useful data.
	
 
 
	
	
	
		
	Posts: 20
	Threads: 4
	Joined: Nov 2017
	
	
 
	
	
		 (06-28-2020, 03:40 PM)undeath Wrote:  See https://hashcat.net/forum/thread-6170.html
Given that default passwords for wpa routers are usually generated using some pseudo-random hashing function I wouldn't expect an AI to create much useful data.
Yes, I'm looking for passwords created by 
humans for their wpa routers. Default passwords won't work.
Thank you for the link though, I was not aware of this.
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 20
	Threads: 4
	Joined: Nov 2017
	
	
 
	
		
		
		07-01-2020, 05:58 PM 
(This post was last modified: 07-01-2020, 06:00 PM by dizcza.
 Edit Reason: ssid is a better name
)
		
	 
	
		 (06-28-2020, 02:22 PM)Mem5 Wrote:  You can start with https://wpa-sec.stanev.org/?dicts
But those dict files don't contain SSIDs, do they? I need 
 pairs.
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 803
	Threads: 135
	Joined: Feb 2011
	
	
 
	
	
		Hum. So you are looking at relationships between ESSID and passwords, but you are only interested in passwords created by humans?
IMHO human generated passwords have almost no relationships with ESSID, apart maybe essid==password but you don't need AI for that.
Human passwords are (pet) names, birthdates, etc.
	
	
	
	
	
 
 
	
	
	
		
	Posts: 20
	Threads: 4
	Joined: Nov 2017
	
	
 
	
	
		 (07-02-2020, 07:39 PM)Mem5 Wrote:  Hum. So you are looking at relationships between ESSID and passwords, but you are only interested in passwords created by humans?
IMHO human generated passwords have almost no relationships with ESSID, apart maybe essid==password but you don't need AI for that.
Human passwords are (pet) names, birthdates, etc.
If you're right, the project doesn't make sense after all. I do find cases when a key consists of shuffled word compounds of SSID joined with a symbol or peppered with a simple prefix or suffix. They are not essid==password but typical rules rule them out... and they are rare, I agree. I'd be interested to look deeply into these relations to craft more useful rules.
Besides this, I argue that sometimes there 
is information in ESSID. If not a plain key, it shifts the probability distribution of favorable candidates to one peak or another. For example, an AP with "TurTelekom_Z4Ry" SSID 
typically won't use pet names unless the director is a funny man. While APs with SSID "Svetlanochka" have proven to use (pet) names as passwords. Training the distribution of such most likely words could be a good candidate for AI.