Jump to content

aszu

Members
  • Posts

    1
  • Joined

  • Last visited

Everything posted by aszu

  1. Thanks for the list, although as mentioned, there is a lot of duplicates. Regarding cracking handshakes with this list: guys, you are going it wrong! :) The only proper way to do this is to use ocl-hashcat. You do NOT need an expensive GPU, great example is AMD HD5830, which can be had on eBay etc for £50 and gives you over 70.000 H/s of processing power. It needs less than 4 hours to go through the entire list. Hashcat is also amazing if you want to check certain only combinations of characters in passwords, for instance to check all passwords ranging from 00000000 to 99999999 you just type: oclhashcat-plus64.exe -m 2500 -a3 handshake.hccap -1 0123456789 ?1?1?1?1?1?1?1?1 Quick explanation: -m 2500: type of hash, in this case WPA (it can also crack myriad of other hash types) -a3: indicates brute force attack, but you can just point it to the dictionary file directly instead (no problem processing multi-gigabyte files) -handshake.hccap: your handshake to crack, file in hccap format can be generated by aircrack-ng (-J option) -1: your character set space - for brute force attack you essentially list all the characters you expect to see in password (there are some macros available as well, like ?d - al digits), you don't need this for dictionary attack - ?1?1?1?1?1?1?1?1: defines format of password for brute force attack, in this case it is 8 characters, each from the '-1' space defined above. Again, no need to specify this for dictionary attack. Thee is more combinations possible, you can for instance have multiple character spaces and mix them with static strings, e.g. if you know that the password is markus + 4 digits, but you do not remember the digits and you do not remember if 'm' is upercase or lowercase, you can create the flowing rule: -1 mM ?1arkus?d?d?d?d All super fast and in real time, no need to generate static combinations lists or any of such nonsense. Tips: - adding '-n 32 -u 2048' options to hashcat command line will significantly speed up processing speed (usually by over 50%), at the expense of desktop responsiveness. - if your cracking crashes/stops at any point, you can restore it by using --restore option. It is also worth to specify --restore-timer interval, so it saves your progress regularly. I am really impressed by hashcat, it makes aircrack and other contraptions totally obsolete.
×
×
  • Create New...