NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Wireless Cracking - Wifi wpa2 password request


9 Results - Page 1 of 1 -
1
Author Message
Avatar
R2

Status: n/a
Joined: Sat, 08 Sep 2018
Posts: 10
Team:
Reputation: 0 Reputation
Offline
Sat, 08 Sep 2018 @ 07:47:02


Hi

I found this forum today and Im completely a newbie in this field.

Id like to pay a cracker to get a wifi password of a Tecnhicolor router.

Can you please help me with that? I would offer you a fair amount in BTC, I just need to know what info you will need and especially HOW to find and send The info you need.

Thanks and sorry if its The wrong section


Avatar
gpuhash_me

Status: Trusted
Joined: Sun, 08 Nov 2015
Posts: 843
Team: gpuhash team
Reputation: 1537 Reputation
Offline
Sat, 08 Sep 2018 @ 08:07:53


Paid subforum: https://forum.hashkiller.co.uk/forum-view.aspx?f=20

(Paid subforum rules: https://forum.hashkiller.co.uk/topic-view.aspx?t=2892&m=48052#48052)

You need to grap WPA handshake or PMKID hash (depends on router model and setup), there are tons of info on the web just google for it


Head of cheap publicity department
Support, discounts, free offers for HK members
BTC: 1GpuHashTYDRn3S6jbLM4YwmutU5iVCxrf

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 3613
Team:
Reputation: 10323 Reputation
Offline
Sat, 08 Sep 2018 @ 08:28:59

If you use UNIX/Linux dist.
Install hcxdumptool. https://github.com/ZerBea/hcxdumptool

For help: "hcxdumptool -h"

Run this tool.(example command)
Stop wpa_supplicant.service and network.manager.service if running.
"systemctl stop wpa_supplicant.service "
"systemctl stop network-manager"

"hcxdumptool -i wlan1 -o hcxdump.pcapng --enable_status=3"



XMPP: freeroute@xmpp.jp
General rules | Paid section rules

Avatar
R2

Status: n/a
Joined: Sat, 08 Sep 2018
Posts: 10
Team:
Reputation: 0 Reputation
Offline
Sat, 08 Sep 2018 @ 09:04:03

Thanks to both

Im
Waiting for The handahake but no client is connected atm.

Is PMKID faster? Does it need a connected client like handshake?


Avatar
R2

Status: n/a
Joined: Sat, 08 Sep 2018
Posts: 10
Team:
Reputation: 0 Reputation
Offline
Sat, 08 Sep 2018 @ 09:32:29

I wan not able to install hcx dumptool...there is no guide on how to do it? I did not find anything about that


Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 3613
Team:
Reputation: 10323 Reputation
Offline
Sat, 08 Sep 2018 @ 09:38:05

Edited:

Due to some internal calculations within in hashcat,
PMKID is a little bit faster than EAPOL with default nonce-error-correctons.

hcxdumptool use a weakness of the protocol.
And it is "Client-less" attack. So not need clients.
hcxdumptool will make every necessary steps.


XMPP: freeroute@xmpp.jp
General rules | Paid section rules

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 3613
Team:
Reputation: 10323 Reputation
Offline
Sat, 08 Sep 2018 @ 10:28:27

According to the developer of hcxtools/hcxdumptool (ZeroBeat):

Due to some internal calculations within in hashcat,
PMKID is a little bit faster than EAPOL with default nonce-error-correctons:

Speed.#1.........: 25025 H/s (5.19ms) @ Accel:32 Loops:16 Thr:1024
vs
Speed.#1.........: 33160 H/s (5.21ms) @ Accel:32 Loops:16 Thr:1024

Cheers
Mike


Session..........: hashcat
Status...........: Exhausted
Hash.Type........: WPA-EAPOL-PBKDF2
Hash.Target......: TP-LINK_112E (AP:e8:94:f6:98:11:2e STA:d0:31:69:8d:99:51)
Time.Started.....: Sat Sep 8 10:56:44 2018 (38 secs)
Time.Estimated...: Sat Sep 8 10:57:22 2018 (0 secs)
Guess.Base.......: File (cow.txt)
Guess.Queue......: 2/2 (100.00%)
Speed.#1.........: 25025 H/s (5.19ms) @ Accel:32 Loops:16 Thr:1024 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 930799/930799 (100.00%)
Rejected.........: 0/930799 (0.00%)
Restore.Point....: 930799/930799 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidates.#1....: retsubbuster ->
No_Lord_Shall_Stand_Before_Myself,I_am_Deicide
Hardware.Mon.#1..: Temp: 65c Util: 52% Core:1176MHz Mem: 900MHz Bus:4


Session..........: hashcat
Status...........: Exhausted
Hash.Type........: WPA-PMKID-PBKDF2
Hash.Target......:
2d97a8b394d2886f8f4ac01cf0bc7fb9*accf85b1b941*b85a7...393431
Time.Started.....: Sat Sep 8 10:55:45 2018 (28 secs)
Time.Estimated...: Sat Sep 8 10:56:13 2018 (0 secs)
Guess.Base.......: File (cow.txt)
Guess.Queue......: 2/2 (100.00%)
Speed.#1.........: 33160 H/s (5.21ms) @ Accel:32 Loops:16 Thr:1024 Vec:1
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 930799/930799 (100.00%)
Rejected.........: 0/930799 (0.00%)
Restore.Point....: 930799/930799 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidates.#1....: retsubbuster ->
No_Lord_Shall_Stand_Before_Myself,I_am_Deicide
Hardware.Mon.#1..: Temp: 65c Util: 69% Core:1176MHz Mem: 900MHz Bus:4


XMPP: freeroute@xmpp.jp
General rules | Paid section rules

Avatar
R2

Status: n/a
Joined: Sat, 08 Sep 2018
Posts: 10
Team:
Reputation: 0 Reputation
Offline
Sat, 08 Sep 2018 @ 14:54:27

ok I have the handshake and the .cap file Now can I send the request?


Avatar
Bomolioot

Status: Trusted
Joined: Wed, 28 Mar 2018
Posts: 1682
Team:
Reputation: 6281 Reputation
Offline
Sat, 08 Sep 2018 @ 15:39:42

Yes, post your handshake (.cap file) in the "WPA Packet Cracking" or "Paid password recovery" section (like you mentioned earlier).

And we will do our best


BTC: 1LeFmcwoCxJ3eiK1z2mz69vU5M8CbYNuKQ
ETH: 0x24D23077B8214CAbe87e18bee6f14CFaE3a955dC


9 Results - Page 1 of 1 -
1

We have a total of 211679 messages in 25973 topics.
We have a total of 22980 registered users.
Our newest registered member is MatheSzil.