Jump to content

wvPasssat

Members
  • Posts

    2
  • Joined

  • Last visited

wvPasssat's Achievements

  1. Thank you. Okey Hashcat was a success cuz of adding the pw into the file. So you mean thats more or less the only approach for cracking the pw? I thought it was possible to decrypt the 4 way message or the one containing the pw. This means that you would need to finde the ssid on the router and change yours to the same, so the "victim" auto connects to you. From there you will have the MAC adress and then you could use that one to connect to the router? Or no, i suppose they will still be sending the 4way handshake. If you then have physical access to say an android phone, you should be able to locate the map in the software of the phone containing the pw or? Regarding all testing, its of course done on devices with permission to attack but are mostly theoretically done.
  2. Hi, I´m new to this so I´m trying to learn. I tried to decrypt a 4way handshake .hashcat22000 that I got from the pineapple using Hashcat on windows with a wordlist called rockyou, I think.? It didnt work. Now I´m trying to use Wireshark to decrypt the handshake in .pcap. I´ve been looking around on internet but all I find is how to decrypt internet traffic. I would like to understand how I can decrypt and see my password in the caputured handshake, anyone? Pls. Feel free to correct me regarding terms and so on, as I said, im here to learn. Thank you🙂
×
×
  • Create New...