NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - General Discussion - Tip of the day


131 Results - Page 5 of 5 -
1 2 3 4 5
Author Message
Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 3807
Team:
Reputation: 10625 Reputation
Online
Sat, 21 Dec 2019 @ 14:44:38

Use a POT file to generate a new wordlist

in case john the ripper:
cut -d: -f2 john.pot | sort -u > pot.dic

in case hashcat:
cut -d: -f2 hashcat.potfile | sort -u > pot.dic


13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
0xc903a1668256F0A1846771F969dF0A7D13f80684
General rules | Paid section rules

Avatar
Milzo
Administrator
Status: Trusted
Joined: Sat, 29 Dec 2012
Posts: 3110
Team:
Reputation: 4764 Reputation
Online
Sat, 21 Dec 2019 @ 15:16:30

freeroute said:

Use a POT file to generate a new wordlist

in case john the ripper:
cut -d: -f2 john.pot | sort -u > pot.dic

in case hashcat:
cut -d: -f2 hashcat.potfile | sort -u > pot.dic

cut -d: -f2 is problematic, you'll end up with salt:plain

This isn't perfect either if the plain contains a colon.

sed 's/\(.*\):/\1\t/' hashcat.potfile | cut -f2


Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 3807
Team:
Reputation: 10625 Reputation
Online
Sat, 21 Dec 2019 @ 15:24:41

Thank you for the correction.


13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
0xc903a1668256F0A1846771F969dF0A7D13f80684
General rules | Paid section rules

Avatar
team_cyclone

Status: Trusted
Joined: Sun, 25 Aug 2019
Posts: 552
Team:
Reputation: 473 Reputation
Offline
Sat, 21 Dec 2019 @ 16:32:48

I've used this command with success on linux with both salted and non-salted potfiles -- once again as long as plaintext doesn't contain a colon.

rev potfile | cut -d: -f1 | rev | sort -u > wordlist.txt


Sysadmin by day | Hash cracker by night | GPU: 180 GH/s
ETH: 0xc6016a2D04031f9665761E4Db2363Cceaa4146A3
BTC: 1Fg38ik9xBFCQiVdAi9ztobJ9rGUYyefR5
+rep

Avatar
CarolRoberts

Status: n/a
Joined: Fri, 29 Nov 2019
Posts: 3
Team:
Reputation: 0 Reputation
Offline
Thu, 26 Dec 2019 @ 10:34:44

team_cyclone said:

I've used this command with success on linux with both salted and non-salted potfiles -- once again as long as plaintext doesn't contain a colon.

rev potfile | cut -d: -f1 | rev | sort -u > wordlist.txt


Why?


Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 3807
Team:
Reputation: 10625 Reputation
Online
Thu, 26 Dec 2019 @ 13:40:27

cap2hccapx
Tool used to Convert a WPA cap/pcap/pcapng capture file to a hashcat capture file (re)written in Python

Supports cap/pcap/pcapng
Supports combined cap/pcap/(pcapng) files
Supports gz compressed cap/pcap/pcapng files
Export as hccapx (hashcat mode: 2500)
Export as hcwpax (hashcat mode: 22000)
Export only authenticated handshakes or all handshakes
Output hccapx files can be filtered/grouped

Note: "The new hashcat mode (22000) will allow for PBKDF2 heavy operation reuse with same ESSIDs between hccapx and pmkid."


13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
0xc903a1668256F0A1846771F969dF0A7D13f80684
General rules | Paid section rules

Avatar
xut

Status: n/a
Joined: Sat, 18 May 2019
Posts: 468
Team:
Reputation: 286 Reputation
Online
Thu, 26 Dec 2019 @ 13:56:40

would this be a safe(r) option such as

aircrack -j ?

so this would be more for group converts.


Avatar
xut

Status: n/a
Joined: Sat, 18 May 2019
Posts: 468
Team:
Reputation: 286 Reputation
Online
Thu, 26 Dec 2019 @ 20:26:09

I've been using this hashcat rule for a while and getting some nice results from it..

It's called ' OneRuleToRuleThemAll.rule '

details here https://www.notsosecure.com/one-rule-to-rule-them-all/

github containing rule https://github.com/NotSoSecure/password_cracking_rules

hope it helps some people out!


Avatar
xut

Status: n/a
Joined: Sat, 18 May 2019
Posts: 468
Team:
Reputation: 286 Reputation
Online
Sat, 28 Dec 2019 @ 18:06:35

A nice little site for identifying a hash

https://mattw.io/hashID/ for lookups..

it even gives you the hashcat mode and/or if john-the-ripper supports it.

very nice and clean

more details here : https://github.com/mattwright324/hashID/


Avatar
xut

Status: n/a
Joined: Sat, 18 May 2019
Posts: 468
Team:
Reputation: 286 Reputation
Online
4 days ago

Pretty nasty exploit affecting the Broadcom middleware on cable modem chipsets

technical read here : https://github.com/Lyrebirds/Cable-Haunt-Report/releases/latest/download/report.pdf

more details at https://cablehaunt.com/

p.s. I know the COMPAL ones are used by Virgin media in EU, there's 10's of millions of routers affected alone..

++++

make sure you have your modem updated to the latest firmware... The list is growing by the day..

Modems confirmed by ISPs or us

Model Firmware Version Port Default Credentials
Sagemcom F@st 3890 50.10.19.* 6080 spectrum:spectrum (Authorization: Basic)
Sagemcom F@st 3686 SIP_3.428.0-* 6080 spectrum:spectrum (Authorization: Basic)
Technicolor TC7230 STEB 01.25 8080 No authorization needed
Netgear C6250EMR V2.01.05 8080 No authorization needed
Netgear CG3700EMR V2.01.03 8080 No authorization needed
Sagemcom F@st 3890 05.76.6.3a unknown unknown
Sagemcom F@st 3686 4.83.0 unknown unknown
COMPAL 7284E 5.510.5.11 unknown unknown
COMPAL 7486E 5.510.5.11 unknown unknown
Netgear CG3700EMR V2.01.05 8080 No authorization needed

Modems confirmed by the community
Model Firmware Version Port Default Credentials ISP of Reporter
Technicolor TC4400 SR70.12.33-180327 8080 admin:bEn2o#US9s (Authorization: Basic) unknown
Arris Surfboard SB8200 0200.174F.311915 8080 No authorization needed Comcast
Arris Surfboard CM8200A unknown unknown unknown Comcast
Arris Surfboard SB6183­ D30CM-OSPREY-1.5.2.5-GA-00-NOSH 8080 No authorization needed Spectrum (previously Time Warner Cable)
Netgear CM1000* V6.01.02 8080 admin:password (Authorization: Basic)/no authorization needed - ISP Dependent (Changeable) COX US and Comcast
Netgear CM600 V1.01.14 49200 No authorization needed unknown
Humax HGB10R-02 BRGCAB 1.0.03 8080 No authorization needed NET CLARO Brazil­
Technicolor TC7300 STF3.31.11­ 8080 No authorization needed Claro Colombia­
Cisco EPC3928AD e3928A-E10-5 8080 No authorization needed Ziggo
Technicolor TC7200 STDC.01.31 8080 No authorization needed Pÿur


Avatar
haernat

Status: n/a
Joined: Sat, 07 Dec 2019
Posts: 21
Team:
Reputation: 10 Reputation
Offline
3 days ago

xut said:


make sure you have your modem updated to the latest firmware...

Good luck with that
Most modems can only be updated by the ISP, not the user

Attacks will come from inside your LAN from a malicious ad or something
else that creeps in through a browser, or some other application. Every
bad actor will be working furiously to exploit this before it gets patched.

The best you can do is block outgoing access to the modem spectrum analyzer
with a firewall, assuming you can find the port.

Otherwise, just pray until the ISP updates your modem



131 Results - Page 5 of 5 -
1 2 3 4 5

We have a total of 220266 messages in 26882 topics.
We have a total of 23606 registered users.
Our newest registered member is Jwd.