exeption Posted March 27, 2010 Share Posted March 27, 2010 Short intro Got the handshake on a wpa-psk access point. Run Aircrack-ng -w PASSWORDLIST (780mb) -b BSSID sniff-01.cap Problem It has now gone for about 2.5 hours scanning passphrases without any success, Is this ever gonna work or do I need to do it another way? Catched this from the net and truly wonder if there could be some truth to it. IMPORTANT This means that the passphrase must be contained in the dictionary you are using to break WPA/WPA2. If it is not in the dictionary then aircrack-ng will be unable to determine the key. I also have a 21GB large password list to be used, but I don´t know if it is wurth running it as I may take a couple of days to scan through? Regards ExEptiOn Quote Link to comment Share on other sites More sharing options...
Sparda Posted March 27, 2010 Share Posted March 27, 2010 Cracking WPA could take millennia. Quote Link to comment Share on other sites More sharing options...
exeption Posted March 27, 2010 Author Share Posted March 27, 2010 Cracking WPA could take millennia. Thank you, but seems to me there should be an easier way to gain access to a wpa-psk AP, how about collecting ARP packages and then use them to find the key? Any other ideas? Quote Link to comment Share on other sites More sharing options...
Sparda Posted March 27, 2010 Share Posted March 27, 2010 Factory reset the AP. Quote Link to comment Share on other sites More sharing options...
Seshan Posted March 27, 2010 Share Posted March 27, 2010 Thank you, but seems to me there should be an easier way to gain access to a wpa-psk AP, how about collecting ARP packages and then use them to find the key? Any other ideas? I'm sure if there was a easier way then it would have been found out by now. Quote Link to comment Share on other sites More sharing options...
Charles Posted March 27, 2010 Share Posted March 27, 2010 Something like this: 17242ABEA732EB8289DBE4F172C1092BEDE53BE9640E0B6640211AF5E9ECED0F Won't be in a dictionary list. Meaning you won't be able to bruteforce it using a Dictionary attack. Quote Link to comment Share on other sites More sharing options...
Netshroud Posted March 27, 2010 Share Posted March 27, 2010 Use Pyrit in conjunction with CUDA and a NVIDIA card, or (and I haven't tested this) Stream with an ATi card. Quote Link to comment Share on other sites More sharing options...
exeption Posted March 27, 2010 Author Share Posted March 27, 2010 Use Pyrit in conjunction with CUDA and a NVIDIA card, or (and I haven't tested this) Stream with an ATi card. Will look into this, have read somthing about it and know for a fact that it scans 2000000 at about 3 hours and a dictionary scan will take about 6 hours. So wurth the try.. By the way, after 6 hours now, my scan is at 3,7 mill keys tested LOL Quote Link to comment Share on other sites More sharing options...
Inked Posted March 29, 2010 Share Posted March 29, 2010 cracking WPA CAN be extremely easy or it could be impossible. It all depends on if the passkey is in the word list you are using. I suppose it really depends on how much time you think it is worth trying word lists. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.