NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - WPA Packet Cracking - 3 handshakes


3 Results - Page 1 of 1 -
1
Author Message
Avatar
jimmy87

Status: n/a
Joined: Thu, 01 Oct 2015
Posts: 8
Team:
Reputation: 0 Reputation
Offline
Sat, 16 Mar 2019 @ 03:17:51

Hi please help me with these handshakes.

i run them on gpuhash.me without succes. (for linkem i paid for [0-9] [a-f]and failed)

Linkem keyspace [0-9][a-z]

For D-link i pay 5$ btc.


Attachments: Login to view attachments.
Avatar
jimmy87

Status: n/a
Joined: Thu, 01 Oct 2015
Posts: 8
Team:
Reputation: 0 Reputation
Offline
Sat, 16 Mar 2019 @ 12:49:57

another 4 vodafone and 1 telecom handshake /italy

i pay 5$ btc for one of them.

Ps: keyspace lenth for linkem (first post) its 8 (0-9 / a-z)


Attachments: Login to view attachments.
Avatar
valerio

Status: n/a
Joined: Thu, 01 Aug 2019
Posts: 1
Team:
Reputation: 0 Reputation
Offline
Fri, 02 Aug 2019 @ 16:54:24

I know a lot of time has elapsed since your request.

I found how the Linkem password is generated on recent routers, it is a function of the serial number of the router (GMKyymmddNNNNNN) and the last 6 digits of the SSID (5F176D in your case). I didn't know the serial number but I was able to generate a wordlist of a couple of years of possible serial numbers and use aircrack-ng on this wordlist and your handshake capture file, in this way I was able to find the password that is "p4g5r8fh"




3 Results - Page 1 of 1 -
1

We have a total of 201303 messages in 24812 topics.
We have a total of 22100 registered users.
Our newest registered member is shee303.