Jump to content

Search the Community

Showing results for tags 'Password Cracking'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 4 results

  1. Ok so I have been trying for the past few days to generate a solid wordlist for comcast Sagemcom Routers WPA2 since there is nothing even close to it out there as far as I have seen. As far as the policies for the default WPA2, I have been able to narrow it down pretty good from getting some WPA2 keys from some friends routers. The keys I got are islandreview309 cleanship039 loudspider233 With those 3 examples I have been to determine these rules. *min character length is 10 *max character lenght is 15 *all lowercase *2 seperate words *noun/verb combo *3 digit number 000-999 at the end of the key As far as password generators, the only one I think would be useable in this instance is CRUNCH but, when I* enter the data I can only do 1 set of the same character lenghts per list because of the -t option. and for jus the max 10 min 10 character list it said the file size would be over 600,000 GB. Is there a way to get rid of all the passwords that wont be words or to tell crunch that it has to have 2 words in each password. Or is there another program that can do this easier,I have tried everything I know and have looked all over the net for answers. Im finally stuck. I copied and pasted the command that i used and its output below. crunch 10 10 abcdefghijklmnopqrstuzwxyz0123456789 -d 2@ -t @@@@@@@%%% -o /root/Desktop/Crunch wordlist.txt Crunch will now generate the following amount of data: 704910951360000 bytes 672255469 MB 656499 GB 641 TB 0 PB Crunch will now generate the following number of lines: 64082813760000 crunch: 0% completed generating output
  2. Rwilson

    rwilson

    Hi all, I am new to the site but have been a hobby hacker for a little over 2 years. Unfortunately the laptops I was using for my Kali Linux needs has died and I am in the market for a new one. However, I am curious if it would be more efficient both in cost and speed, to actually build my own computer designated only for Kali and some of my heavier hash and password cracks. I have built/refurbished computers in the past, but never something designed specifically for this purpose. Ideally this computer would have full functionality, but really it would be a cracking wizard. I read the Kali docs and while it gave me the minimum specs required, I haven't really found anything that says what the best is nor any guidance on how to expand on a basic build. Here are some of the questions I have or topics I would like more experienced people have: 1) In order to increase my cracking speed I will be increasing my GPU's. Would it be possible to use a bitcoin/litecoin/whatever-coin mining rig set up to increase my speeds? Has any one ever attempted converting a rig to run Linux and hashes? 2) What kind of CPU would anyone recommend? 3) I know my power supply will be dictated based on the above 2, but any suggestions? 4) Any other suggestions or parts I am not thinking of? Thanks in advance!
  3. Hi there. I've been given an assignment at university to get into the administrator profile and leave a text file on the desktop to prove I was there. I have a list of users but all attempts to crack passwords has been unfruitful. I've been given a very restricted guest account so I am attempting to upgrade to another account to hopefully gain more info about the system. I am looking for advice about where to go from here/upgrade my guest account/get into a very difficult admin account. I'd also like to say that this is completely legal as I have been given this task from the university and it's over virtual machines. (Kali linux to XP).
  4. Just a video having fun cracking a password game at a conference a few months back. I had permission. Used a simple script to generate all the syntax around 10,000 of the most common passwords on the internet. Basically enter password -> Enter -> Delay -->Delete password (incase it failed) --> enter next password The passwords were being entered faster then safari could handle, after unplugging the ducky it was still going for a long while.
×
×
  • Create New...