Jump to content

Decoy

Active Members
  • Posts

    248
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by Decoy

  1. Hi @Foxtrot - the new firmware is great. Is there any chance we can modify '/etc/opkg.conf' in a future release to add the following line? dest usb /mnt I've been experimenting with installing required packages directly onto USB with some success so far and was hoping a firmware update wouldn't wipe it out or require others to add it for future payloads. Thanks! Decoy
  2. I know this post is super old - but a quick fix (which I just used recently) is to modify the payload changing NETMODE from TRANSPARENT to BRIDGE. Obviously this won't work if you're looking to keep the device hidden as you will be assigned an IP address from the target; however for my purposes I was simply monitoring one node on my network. This allowed me to track time appropriately. Payload modification: function run() { # Create loot directory mkdir -p /mnt/loot/tcpdump &> /dev/null # Set networking to TRANSPARENT mode and wait five seconds #NETMODE TRANSPARENT # Set networking to BRIDGE to allow for correct timestamp on caps NETMODE BRIDGE sleep 5 # Start tcpdump on the bridge interface tcpdump -i br-lan -s 0 -w /mnt/loot/tcpdump/dump_$(date +%Y-%m-%d-%H%M%S).pcap &>/dev/null & tpid=$! # Wait for button to be pressed (disable button LED) NO_LED=true BUTTON finish $tpid }
  3. Hi Everyone, So my latest obsession has been with embedded device hacking/reverse engineering. I've been having tons of fun discovering UART/JTAG ports/pins, dumping firmware, and walking the file systems. As far as binary analysis goes - I am looking for something comparable to IDA Pro. I've used it and like it, and from what I have read - it's considered the best; however it is also the most expensive. Does anyone know of any good alternatives the have a comparable feature set? I've been looking into Binary Ninja which is about $150 for a Hobbyist license - I am leaning towards that one so far. Any suggestions would be greatly appreciated. Thanks, D
  4. This was actually mentioned in their "Let's Code" video when the Packet Squirrel was first released - so it's a known "issue". It can be done by syncing with NTP; however this can't be done in Transparent mode. You would need an IP on the target network with Internet access in order to accomplish this. While it might not be perfect, and might require some parsing on your part - you could always snag Timestamps from HTTP headers as well when returned across the wire.
  5. This is a pretty decent article explaining how it can be done: https://ferrancasanovas.wordpress.com/cracking-and-sniffing-gsm-with-rtl-sdr-concept/
  6. That's precisely my intention.
  7. So I was able to change my password by pretending to forget it; however it might not be a bad idea to introduce a legitimate feature on the account page for this. Please let me know if I am just blind and can't find it anywhere.
  8. Hello, I don't know if I am blind or what - but I can't seem to find where to change my Hakshop Account password ANYWHERE. Is this functionality not available? It looks like the only thing I can add/change is my address. Thanks, D
  9. I agree with the ugly pocket; however I do like the idea of using nethunter on a phone while wardriving. It's easier to use my mobile device and slap an alpha card onto my passenger side window or driver side window as opposed to using a laptop.
  10. I just picked this up myself. I love Johnny Long and saw he made some contributions.
  11. That's right. I'm confusing the two. Check out his drone work too, it's pretty awesome. It flies around hacking other drones in flight, creating a drone army.
  12. I saw that for the first time last year I think... I'm more amazed that he built it out of a little girl's toy. He also caused mass inflation of the price in which to purchase one... But definitely genius. I've picked up some SDR gear, but I've yet to dabble.
  13. Are we talking strictly Mobile Browsing? The new Focus browser from Firefox is decent, and seems to tote privacy as its primary purpose. If we're talking desktop, I think Firefox is the way to go as there tend to be more plug-ins available for specific tasks. I was really excited for the Mantra Browser (variation of Firefox) from the OWASP project, but support seems to have fizzled out. There hasn't been an update in quite some time. This browser came bundled with a suite of plugins and pre-configured settings for web application testing. Check out some videos when you get the chance, it was pretty slick.
  14. Decoy

    CUDA

    I've been thinking more about this. Are you talking about GPS locations and such? I'm think you could match on SSID/BSSID to grab that latitude/longitude from the WiGle files and give a more accurate picture of what (and where) you are looking at. This is a great idea.
  15. Decoy

    CUDA

    Yeah, I posted it from my phone. That GitHub link points to a batch file, what you see above. I'm going to compile it all and clean it up. Maybe I'll submit a pull request for SecLists.
  16. Decoy

    CUDA

    This batch file is a pretty comprehensive list of default passwords by router: https://github.com/wpatoolkit/Default-Keyspace-List mkdir "./defaultwpa" cd "./defaultwpa" mkdir "2WIREXXX-[0-9][len10]" mkdir "3Wireless-Modem-XXXX-[0-9A-F][len8]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./3Wireless-Modem-XXXX-[0-9A-F][len8]/3WirelessDefault.txt" mkdir "Alice-12345678-[0-9a-z][len24]" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/AliceGermanyKeygen.cpp>"./Alice-12345678-[0-9a-z][len24]/AliceDefault.txt" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/AliceItalyKeygen.cpp>>"./Alice-12345678-[0-9a-z][len24]/AliceDefault.txt" echo http://wpacalculator.altervista.org/XL/Alice.php>>"./Alice-12345678-[0-9a-z][len24]/AliceDefault.txt" mkdir "Andared" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/AndaredKeygen.cpp>"./Andared/AndaredDefault.txt" mkdir "AOLBB-XXXXXX-[0-9A-Z][len8]" mkdir "Arcadyan" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/ArcadyanKeygen.cpp>"./Arcadyan/ArcadyanDefault.txt" mkdir "ArnetPirelli" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/ArnetPirelliKeygen.cpp>"./ArnetPirelli/ArnetPirelliDefault.txt" mkdir "ATTXXX-[0-9][len10]" mkdir "ATTXXXX-[0-9A-Z][len10]" mkdir "ATTXXXXXXX-[0-9a-z+][len12]" mkdir "Axtel" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/AxtelKeygen.cpp>"./Axtel/AxtelDefault.txt" mkdir "belkin.xxx-[2-9a-f][len8]" echo https://github.com/wpatoolkit/8-Hex-Generator>"./belkin.xxx-[2-9a-f][len8]/BelkinDefault.txt" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/BelkinKeygen.cpp>>"./belkin.xxx-[2-9a-f][len8]/BelkinDefault.txt" echo https://bitbucket.org/dudux/belkin4xx>>"./belkin.xxx-[2-9a-f][len8]/BelkinDefault.txt" echo https://github.com/Konsole512/Crippled>>"./belkin.xxx-[2-9a-f][len8]/BelkinDefault.txt" echo http://www.routerpwn.com/belkinwpa/>>"./belkin.xxx-[2-9a-f][len8]/BelkinDefault.txt" echo https://raw.githubusercontent.com/devttys0/wps/master/pingens/belkin/pingen.c>>"./belkin.xxx-[2-9a-f][len8]/BelkinDefault.txt" mkdir "Belkin.XXXX-[0-9A-F][len8]" echo https://github.com/wpatoolkit/8-Hex-Generator>"./Belkin.XXXX-[0-9A-F][len8]/BelkinDefault.txt" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/BelkinKeygen.cpp>>"./Belkin.XXXX-[0-9A-F][len8]/BelkinDefault.txt" echo https://bitbucket.org/dudux/belkin4xx>>"./Belkin.XXXX-[0-9A-F][len8]/BelkinDefault.txt" echo https://github.com/Konsole512/Crippled>>"./Belkin.XXXX-[0-9A-F][len8]/BelkinDefault.txt" echo http://www.routerpwn.com/belkinwpa/>>"./Belkin.XXXX-[0-9A-F][len8]/BelkinDefault.txt" echo https://raw.githubusercontent.com/devttys0/wps/master/pingens/belkin/pingen.c>>"./Belkin.XXXX-[0-9A-F][len8]/BelkinDefault.txt" mkdir "belkin.xxxx-[2-9a-f][len8]" echo https://github.com/wpatoolkit/8-Hex-Generator>"./belkin.xxxx-[2-9a-f][len8]/BelkinDefault.txt" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/BelkinKeygen.cpp>>"./belkin.xxxx-[2-9a-f][len8]/BelkinDefault.txt" echo https://bitbucket.org/dudux/belkin4xx>>"./belkin.xxxx-[2-9a-f][len8]/BelkinDefault.txt" echo https://github.com/Konsole512/Crippled>>"./belkin.xxxx-[2-9a-f][len8]/BelkinDefault.txt" echo http://www.routerpwn.com/belkinwpa/>>"./belkin.xxxx-[2-9a-f][len8]/BelkinDefault.txt" echo https://raw.githubusercontent.com/devttys0/wps/master/pingens/belkin/pingen.c>>"./belkin.xxxx-[2-9a-f][len8]/BelkinDefault.txt" mkdir "Belkin_XXXXXX-[0-9A-F][len8]" echo https://github.com/wpatoolkit/8-Hex-Generator>"./Belkin_XXXXXX-[0-9A-F][len8]/BelkinDefault.txt" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/BelkinKeygen.cpp>>"./Belkin_XXXXXX-[0-9A-F][len8]/BelkinDefault.txt" echo https://bitbucket.org/dudux/belkin4xx>>"./Belkin_XXXXXX-[0-9A-F][len8]/BelkinDefault.txt" echo https://github.com/Konsole512/Crippled>>"./Belkin_XXXXXX-[0-9A-F][len8]/BelkinDefault.txt" echo http://www.routerpwn.com/belkinwpa/>>"./Belkin_XXXXXX-[0-9A-F][len8]/BelkinDefault.txt" echo https://raw.githubusercontent.com/devttys0/wps/master/pingens/belkin/pingen.c>>"./Belkin_XXXXXX-[0-9A-F][len8]/BelkinDefault.txt" mkdir "BELLXXX-[0-9A-F][len8]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./BELLXXX-[0-9A-F][len8]/BELLDefault.txt" mkdir "BigPondXXXXXX-[0-9A-F][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./BigPondXXXXXX-[0-9A-F][len10]/BigPondDefault.txt" mkdir "BrightBox-XXXXXX-[len8]" mkdir "BTBusinessHub-XXX-[0-9][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./BTBusinessHub-XXX-[0-9][len10]/BTDefault.txt" mkdir "BTHomeHub2-XXXX-[2-9a-f][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./BTHomeHub2-XXXX-[2-9a-f][len10]/BTDefault.txt" mkdir "BTHomeHub-XXXX-[0-9a-f][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./BTHomeHub-XXXX-[0-9a-f][len10]/BTDefault.txt" echo http://wpacalculator.altervista.org/XL/BTHomeHub.php>>"./BTHomeHub-XXXX-[0-9a-f][len10]/BTDefault.txt" echo http://www.gnucitizen.org/blog/default-key-algorithm-in-thomson-and-bt-home-hub-routers/>>"./BTHomeHub-XXXX-[0-9a-f][len10]/BTDefault.txt" mkdir "BTHub3-XXXX-[2-9a-f][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./BTHub3-XXXX-[2-9a-f][len10]/BTDefault.txt" mkdir "BTHub4-XXXX-[2-9a-f][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./BTHub4-XXXX-[2-9a-f][len10]/BTDefault.txt" mkdir "BTHub5-XXXX-[2-9a-f][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./BTHub5-XXXX-[2-9a-f][len10]/BTDefault.txt" mkdir "CabovisaoSagem" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/CabovisaoSagemKeygen.cpp>"./CabovisaoSagem/CabovisaoSagemDefault.txt" mkdir "CenturyLinkXXXX-[0-9a-f][len14]" mkdir "Comtrend" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/ComtrendKeygen.cpp>"./Comtrend/ComtrendDefault.txt" mkdir "Contattami" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/ConnKeygen.cpp>"./Contattami/ContattamiDefault.txt" mkdir "DDW12345-[DDW123]+[0-9A-F_len6]" mkdir "DG123456-[DG1234]+[0-9A-F_len6]" mkdir "Digicom_XXXX-[0-9A-Z][len8]" mkdir "Discus" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/DiscusKeygen.cpp>"./Discus/DiscusDefault.txt" echo https://raw.githubusercontent.com/RobertoEstrada/WLANAudit-Android/master/WLANAudit/src/main/java/es/glasspixel/wlanaudit/keyframework/DiscusKeyCalculator.java>>"./Discus/DiscusDefault.txt" mkdir "DJAWEB_XXXXX-[0-9][len10]" mkdir "Dlink" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/DlinkKeygen.cpp>"./Dlink/DlinkDefault.txt" echo http://wpacalculator.altervista.org/XL/DLink.php>>"./Dlink/DlinkDefault.txt" echo http://www.devttys0.com/2014/10/reversing-d-links-wps-pin-algorithm/>>"./Dlink/DlinkDefault.txt" echo https://raw.githubusercontent.com/devttys0/wps/master/pingens/dlink/pingen.py>>"./Dlink/DlinkDefault.txt" echo http://lixei.me/codigo-fonte-wpa-dlink-php-c/>>"./Dlink/DlinkDefault.txt" echo https://raw.githubusercontent.com/RobertoEstrada/WLANAudit-Android/master/WLANAudit/src/main/java/es/glasspixel/wlanaudit/keyframework/DlinkKeyCalculator.java>>"./Dlink/DlinkDefault.txt" mkdir "Domino-XXXX-[0-9A-F][len8]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./Domino-XXXX-[0-9A-F][len8]/DominoDefault.txt" mkdir "E583X-XXXX-[0-9][len8]" mkdir "E583X-XXXXX-[0-9A-F][len8]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./E583X-XXXXX-[0-9A-F][len8]/E583XDefault.txt" mkdir "EasyBox-XXXXXX-[0-9A-F][len9]" echo http://wpacalculator.altervista.org/XL/EasyBox.php>"./EasyBox-XXXXXX-[0-9A-F][len9]/EasyBoxDefault.txt" echo http://www.wardriving-forum.de/wiki/Standardpassw%C3%B6rter>>"./EasyBox-XXXXXX-[0-9A-F][len9]/EasyBoxDefault.txt" echo http://www.patent-de.com/20081120/DE102007047320A1.html>>"./EasyBox-XXXXXX-[0-9A-F][len9]/EasyBoxDefault.txt" echo https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130805-0_Vodafone_EasyBox_Default_WPS_PIN_Vulnerability_v10.txt>>"./EasyBox-XXXXXX-[0-9A-F][len9]/EasyBoxDefault.txt" echo https://raw.githubusercontent.com/torstenfeld/EasyBoxWpaCalc/master/other_sources/easybox_keygen.sh>>"./EasyBox-XXXXXX-[0-9A-F][len9]/EasyBoxDefault.txt" echo https://raw.githubusercontent.com/torstenfeld/EasyBoxWpaCalc/master/other_sources/easybox_keygen.bat>>"./EasyBox-XXXXXX-[0-9A-F][len9]/EasyBoxDefault.txt" echo http://www.routerpwn.com/EasyBox/>>"./EasyBox-XXXXXX-[0-9A-F][len9]/EasyBoxDefault.txt" mkdir "EEBrightBox-XXXXXX-[word-word-word]" echo https://github.com/wpatoolkit/Word-word-word-Wordlist-Generator>"./EEBrightBox-XXXXXX-[word-word-word]/EEBrightBoxDefault.txt" mkdir "Eircom" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/EircomKeygen.cpp>"./Eircom/EircomDefault.txt" echo http://wpacalculator.altervista.org/XL/Eircom.php>>"./Eircom/EircomDefault.txt" mkdir "ELTEX-XXXX" mkdir "Fastweb" echo http://wpacalculator.altervista.org/XL/Fastweb.php>"./Fastweb/FastwebDefault.txt" mkdir "FRITZ!Box Fon WLAN XXXX-[0-9][len16]" mkdir "HG824x" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/HG824xKeygen.cpp>"./HG824x/HG824xDefault.txt" mkdir "HOME-XXXX(Cisco)-[0-9A-Z][len16]" mkdir "HOME-XXXX(SMC)-[serial_len12]+[0-9A-F_len4]" mkdir "HOME-XXXX-[0-9A-F][len16]" mkdir "Huawei" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/HuaweiKeygen.cpp>"./Huawei/HuaweiDefault.txt" echo http://websec.ca/blog/view/mac2wepkey_huawei>>"./Huawei/HuaweiDefault.txt" echo https://raw.githubusercontent.com/RobertoEstrada/WLANAudit-Android/master/WLANAudit/src/main/java/es/glasspixel/wlanaudit/keyframework/HWeiKeyCalculator.java>>"./Huawei/HuaweiDefault.txt" mkdir "INFINITUMXXXX-[0-9][len10]" mkdir "Infostrada" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/InfostradaKeygen.cpp>"./Infostrada/InfostradaDefault.txt" echo http://wpacalculator.altervista.org/XL/Infostrada.php>>"./Infostrada/InfostradaDefault.txt" mkdir "InterCable" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/InterCableKeygen.cpp>"./InterCable/InterCableDefault.txt" mkdir "JAZZTEL" echo http://wpacalculator.altervista.org/XL/JAZZTEL.php>"./JAZZTEL/JAZZTELDefault.txt" echo https://raw.githubusercontent.com/RobertoEstrada/WLANAudit-Android/master/WLANAudit/src/main/java/es/glasspixel/wlanaudit/keyframework/WLANXXXXKeyCalculator.java>>"./JAZZTEL/JAZZTELDefault.txt" mkdir "Keenetic-XXXX-[a-zA-Z0-9][len8]" mkdir "LinksysXXXXX-[0-9a-z][len10]" mkdir "Livebox-XXXX" mkdir "Maxcom" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/MaxcomKeygen.cpp>"./Maxcom/MaxcomDefault.txt" mkdir "Megared" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/MegaredKeygen.cpp>"./Megared/MegaredDefault.txt" mkdir "MeoPirelli" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/MeoPirelliKeygen.cpp>"./MeoPirelli/MeoPirelliDefault.txt" mkdir "MGTS_GPON_XXXX-[0-9a-f][len8]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./MGTS_GPON_XXXX-[0-9a-f][len8]/MGTSDefault.txt" mkdir "mifi2-[0-9A-Z][len13]" mkdir "MiFiXXXX XXX-[0-9][len11]" mkdir "MobileWifi-XXXX-[0-9][len8]" mkdir "NETGEARXX-[adj+noun+3digs]" echo https://github.com/wpatoolkit/Adj-Noun-Wordlist-Generator>"./NETGEARXX-[adj+noun+3digs]/NetgearDefault.txt" mkdir "NETIASPOT_XXXXXX-[0-9a-z][len12]" mkdir "ONOXXXX-[0-9][len10]" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/OnoKeygen.cpp>"./ONOXXXX-[0-9][len10]/OnoDefault.txt" mkdir "Orange-[0-9a-f][len8] or [0-9A-F][len12]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./Orange-[0-9a-f][len8] or [0-9A-F][len12]/OrangeDefault.txt" mkdir "Orange-XXXX-[2345679ACEF][len8]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./Orange-XXXX-[2345679ACEF][len8]/OrangeDefault.txt" mkdir "Ote" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/OteKeygen.cpp>"./Ote/OteDefault.txt" mkdir "OteBAUD" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/OteBAUDKeygen.cpp>"./OteBAUD/OteBAUDDefault.txt" mkdir "OteHuawei" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/OteHuaweiKeygen.cpp>"./OteHuawei/OteHuaweiDefault.txt" mkdir "PBS" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/PBSKeygen.cpp>"./PBS/PBSDefault.txt" mkdir "Pirelli" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/PirelliKeygen.cpp>"./Pirelli/PirelliDefault.txt" echo https://packetstormsecurity.com/files/131834/Pirelli-Router-P.DG-A4001N-WPA-Key-Reverse-Engineering-Rev-2.html>>"./Pirelli/PirelliDefault.txt" echo http://ednolo.alumnos.upv.es/?p=1883>>"./Pirelli/PirelliDefault.txt" mkdir "PlusnetWireless-XXXXXX-[0-9A-F][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./PlusnetWireless-XXXXXX-[0-9A-F][len10]/PlusnetWirelessDefault.txt" mkdir "PRIMEHOME-XX-[0-9a-f][len8]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./PRIMEHOME-XX-[0-9a-f][len8]/PRIMEHOMEDefault.txt" mkdir "Ptv" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/PtvKeygen.cpp>"./Ptv/PtvDefault.txt" mkdir "ROSTELECOM_XXXX-[ACDEFGHJKMNPQRTUXY3467][len8]" mkdir "SAGEMCOM_XXXX-[ACDEFGHJKMNPQRTUXY3467][len8]" mkdir "SBG123456-[SBG1234]+[0-9A-F_len6]" mkdir "Sitecom" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/SitecomKeygen.cpp>"./Sitecom/SitecomDefault.txt" mkdir "SKYXXXXX-[A-Z][len8]" echo https://github.com/wpatoolkit/Upper-Alpha-Keyspace-Reducer>"./SKYXXXXX-[A-Z][len8]/SkyDefault.txt" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/SkyV1Keygen.cpp>>"./SKYXXXXX-[A-Z][len8]/SkyDefault.txt" mkdir "Speedport500" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/Speedport500Keygen.cpp>"./Speedport500/Speedport500Default.txt" mkdir "SpeedTouchXXXXXX-[0-9A-F][len10]" echo http://wpacalculator.altervista.org/XL/SpeedTouch.php>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" echo http://www.nickkusters.com/en/services/thomson-speedtouch>>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" echo http://www.md5this.com/thomson-speedtouch-crack.html>>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" echo http://www.mentalpitstop.com/touchspeedcalc/calculate_speedtouch_default_wep_wpa_wpa2_password_by_ssid.html>>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" echo http://klasseonline.aboehler.at/stuff/thomson/>>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" echo http://amigdalo.tk/ST/>>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" echo http://www.hakim.ws/st585/KevinDevine/>>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" echo http://sodki.org/data/uploads/code/thomson.sh>>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" echo https://github.com/wpatoolkit/10-Hex-Generator>>"./SpeedTouchXXXXXX-[0-9A-F][len10]/SpeedTouchDefault.txt" mkdir "TAKASHI-XXXXXX-[0-9A-F][len8]" mkdir "TALKTALK-XXXXXX-[ABCDEFGHJKMNPQRTUVWXY346789][len8]" mkdir "Technicolor-[0-9A-F][len10]" echo http://wpacalculator.altervista.org/XL/Technicolor.php>"./Technicolor-[0-9A-F][len10]/TechnicolorDefault.txt" echo https://github.com/wpatoolkit/10-Hex-Generator>>"./Technicolor-[0-9A-F][len10]/TechnicolorDefault.txt" mkdir "Tecom" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/TecomKeygen.cpp>"./Tecom/TecomDefault.txt" mkdir "Tele2Tu" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/TeletuKeygen.cpp>"./Tele2Tu/Tele2TuDefault.txt" echo http://wpacalculator.altervista.org/XL/Tele2.php>>"./Tele2Tu/Tele2TuDefault.txt" mkdir "Telsey" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/TelseyKeygen.cpp>"./Telsey/TelseyDefault.txt" mkdir "TELUSXXXX-[0-9a-f][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./TELUSXXXX-[0-9a-f][len10]/TELUSDefault.txt" mkdir "TelstraXXXXXX-[0-9A-F][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./TelstraXXXXXX-[0-9A-F][len10]/TelstraDefault.txt" mkdir "TG123456-[TG1234]+[0-9A-F_len6]" mkdir "ThomsonXXXXXX-[0-9A-F][len10]" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/ThomsonKeygen.cpp>"./ThomsonXXXXXX-[0-9A-F][len10]/ThomsonDefault.txt" echo https://github.com/wpatoolkit/10-Hex-Generator>>"./ThomsonXXXXXX-[0-9A-F][len10]/ThomsonDefault.txt" mkdir "TIM_PN51T_XXXX-[0-9][len8]" mkdir "TNCAPXXXXXX-[0-9A-F][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./TNCAPXXXXXX-[0-9A-F][len10]/TNCAPDefault.txt" mkdir "TPG-XXXX" mkdir "TP-LINK_Pocket_XXXX_MMMMMM" mkdir "TP-LINK_XXXXXX-[0-9A-F][len8]" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/TplinkKeygen.cpp>"./TP-LINK_XXXXXX-[0-9A-F][len8]/TPLinkDefault.txt" echo http://www.backtrack-linux.org/forums/showthread.php?t=62673>>"./TP-LINK_XXXXXX-[0-9A-F][len8]/TPLinkDefault.txt" echo https://github.com/wpatoolkit/10-Hex-Generator>>"./TP-LINK_XXXXXX-[0-9A-F][len8]/TPLinkDefault.txt" mkdir "U12345678-[U123456]+[0-9A-F_len6]" mkdir "UNITE-XXXX-[0-9][len8]" mkdir "UPCXXXXXXX-[A-Z][len8]" echo https://github.com/wpatoolkit/Upper-Alpha-Keyspace-Reducer>"./UPCXXXXXXX-[A-Z][len8]/UPCDefault.txt" echo https://raw.githubusercontent.com/sporkbomb/wifi-opener/master/upc/upc0wn.sh>>"./UPCXXXXXXX-[A-Z][len8]/UPCDefault.txt" mkdir "Verizon" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/VerizonKeygen.cpp>"./Verizon/VerizonDefault.txt" echo http://wpacalculator.altervista.org/XL/Verizon.php>>"./Verizon/VerizonDefault.txt" echo http://aruljohn.com/fios/>>"./Verizon/VerizonDefault.txt" echo http://www.xkyle.com/verizon-fios-wireless-key-calculator/>>"./Verizon/VerizonDefault.txt" echo https://gist.githubusercontent.com/Eleadon/780b46a73782a12b4454/raw/6ed3749792e170953e76592c7e7324eab102d69f/verizon_fios_wep_keygen.js>>"./Verizon/VerizonDefault.txt" mkdir "Verizon MIFIXXXX XXXX-[0-9][len11]" mkdir "virginmediaXXXXXXX-[abcdefghjklmnpqrstuvwxyz][len8]" echo https://github.com/wpatoolkit/Lower-Alpha-Keyspace-Reducer>"./virginmediaXXXXXXX-[abcdefghjklmnpqrstuvwxyz][len8]/VirginDefault.txt" mkdir "VirginMobile MiFiXXXX XXX-[0-9][len11]" mkdir "VMXXXXXX-2G-[abcdefghjklmnpqrstuvwxyz][len8]" echo https://github.com/wpatoolkit/Lower-Alpha-Keyspace-Reducer>"./VMXXXXXX-2G-[abcdefghjklmnpqrstuvwxyz][len8]/VirginDefault.txt" mkdir "VMXXXXXX-5G-[abcdefghjklmnpqrstuvwxyz][len8]" echo https://github.com/wpatoolkit/Lower-Alpha-Keyspace-Reducer>"./VMXXXXXX-5G-[abcdefghjklmnpqrstuvwxyz][len8]/VirginDefault.txt" mkdir "WiFi-Arnet-XXXX(Pirelli)-[0-9a-z][len10]" mkdir "WiFi-Arnet-XXXX-[0-9a-zA-Z][len13]" mkdir "WifimediaR" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/WifimediaRKeygen.cpp>"./WifimediaR/WifimediaRDefault.txt" mkdir "WLAN" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/Wlan2Keygen.cpp>"./WLAN/WLANDefault.txt" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/Wlan6Keygen.cpp>>"./WLAN/WLANDefault.txt" echo http://wpacalculator.altervista.org/XL/WLAN.php>>"./WLAN/WLANDefault.txt" echo https://raw.githubusercontent.com/RobertoEstrada/WLANAudit-Android/master/WLANAudit/src/main/java/es/glasspixel/wlanaudit/keyframework/WLANXXXXKeyCalculator.java>>"./WLAN/WLANDefault.txt" echo https://raw.githubusercontent.com/RobertoEstrada/WLANAudit-Android/master/WLANAudit/src/main/java/es/glasspixel/wlanaudit/keyframework/WiFiXXXXXXKeyCalculator.java>>"./WLAN/WLANDefault.txt" mkdir "WLAN1-XXXXXX-[0-9A-F][len10]" echo https://github.com/wpatoolkit/10-Hex-Generator>"./WLAN1-XXXXXX-[0-9A-F][len10]/WLAN1Default.txt" mkdir "XXXXX-[0-9A-Z][len16]" mkdir "ZyXELXXXXXX-[0-9A-Z][len13]" echo https://raw.githubusercontent.com/routerkeygen/routerkeygenPC/master/src/algorithms/ZyxelKeygen.cpp>"./ZyXELXXXXXX-[0-9A-Z][len13]/ZyXELDefault.txt"
  17. Decoy

    CUDA

    Yes, that link I posted above generates a good one. Default passwords are always Adjective + Noun + 3 numbers. Example: brightcoconut657 That wpatools has a great wordlist generator. That's ideally what I'd like. I want to run an Ubuntu Server for hash cracking only. Eventually. For now though, it'd be cool to modify besside to do what you're saying. I might do just that :)
  18. Decoy

    CUDA

    Keep me posted, I'd be interested in that. I've often toyed with a similar idea as well. It would definitely be useful. Unfortunately it doesn't. 1 kH/s = 1000 hashes per second 1 mH/s = 1,000,000 hashes per second 1 gH/z = 1,000,000,000 hashes per second I chewed through almost a billion hashes in under 20 minutes this afternoon (WPA2).
  19. Decoy

    CUDA

    And I haven't overclocked them yet, and I have three exhaust fans and one intake fan. Water-cooling makes me nervous.
  20. Decoy

    CUDA

    Yeah, I'm having a blast with this rig so far. I actually just found this new gem on GitHub, I'm adding these to my toolbox: https://github.com/wpatoolkit I was actually about to write my own NetGear default tool until I found these.
  21. Decoy

    CUDA

    Holy crap. That's man, that's awesome. I've just been combining lists as I find then, rockyou, dark0de, and all the latest breaches, etc. That's definitely a comprehensive list... There's a good repository on GitHub I use too, https://github.com/danielmiessler/SecLists
  22. Decoy

    CUDA

    Yes, that's 781,400 hashes per second. I have a custom wordlist of 80+ million passwords, and it chews through that in no time at all. I'm running 2x Nvidia GeForce Founders Editions SLI. That's both of them combined. NTLM hashes: Hashtype: NTLM Speed.Dev.#1.....: 38451.1 MH/s (69.34ms) Speed.Dev.#2.....: 39406.8 MH/s (67.55ms) Speed.Dev.#*.....: 77858.0 MH/s I will post a pyrit benchmark tonight.
×
×
  • Create New...