NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Wireless Cracking - VirginMedia Keyspace Rules


13 Results - Page 1 of 1 -
1
Author Message
Avatar
zdz

Status: n/a
Joined: Sun, 26 May 2013
Posts: 11
Team:
Reputation: 4 Reputation
Offline
Sun, 26 May 2013 @ 17:59:05

As we know, VirginMedia Superhubs use lowercase 8-chars.

Does anyone know any rules associated with this to make brute-forcing easier?

For example, the character set? Is it really [a-z]?

Some characters are often excluded due to legibility (e.g. 'o' 'i' 'z'. Some vowels to prevent common words being spelt, including profanity.

Microsoft, for example, in their (older) product keys follow these rules:


The 24 used are:
2346789BCDFGHJKMPQRTVWXY

The 12 unused are:
015AEILNOSUZ


If we can eliminate some unused characters, it would of course bring down the BF time.


Any thoughts?


-=zdz=-




edited by zdz on 26/05/2013


Avatar
hash-ire

Status: Member
Joined: Mon, 19 Aug 2013
Posts: 257
Team:
Reputation: 307 Reputation
Offline
Mon, 09 Sep 2013 @ 10:48:24

So, I had some VM default password list and I decided to look closer at them:

The charset I completed so far: abcdefghjklmnpqrstuvxyz
Missing letters: iow

Here's the password list I used:

rubyyksd
cudgjchz
nhauscjb
fsjmrraz
lxdsgkqc
blkrehez
rpnfgket
yevlulbp
cmarydcg
frlecjhc
qkqbjzhn
relckujn

Maybe it's too early to say but according to this data just 23/26 letters are used. Good luck with your bruteforce .


Avatar
Hash-IT

Status: Trusted
Joined: Tue, 02 Aug 2011
Posts: 4598
Team: HashKiller
Reputation: 2982 Reputation
Offline
Mon, 09 Sep 2013 @ 13:52:58

hash-ire said:

So, I had some VM default password list and I decided to look closer at them:

The charset I completed so far: abcdefghjklmnpqrstuvxyz
Missing letters: iow

Here's the password list I used:

rubyyksd
cudgjchz
nhauscjb
fsjmrraz
lxdsgkqc
blkrehez
rpnfgket
yevlulbp
cmarydcg
frlecjhc
qkqbjzhn
relckujn

Maybe it's too early to say but according to this data just 23/26 letters are used. Good luck with your bruteforce .

Thanks for your post

I have been working on these myself and I have managed to break everyone I have tested by omitting i and o.

I have however 1 password found where it included a w.

Still, being able to remove i and o is a great leap forward and one I have had much success with.


Please read the forum rules. | Please read the paid section rules.

BTC: 1MmWESN5bKZ1YSuHrm5uNwnQYxWyQnEQ6E

Avatar
hash-ire

Status: Member
Joined: Mon, 19 Aug 2013
Posts: 257
Team:
Reputation: 307 Reputation
Offline
Mon, 09 Sep 2013 @ 14:31:55

Hash-IT said:

I have however 1 password found where it included a w.


You're right. There was one even on the picture of my old post: http://http://forum.md5decrypter.co.uk/topic3590-essid-identification-thread.aspx
Forgot to check.

Hash-IT said:

I have been working on these myself and I have managed to break everyone I have tested by omitting i and o.


Did I miss anything? Have you really bruteforced 8^24 possible combinations?


Avatar
Hash-IT

Status: Trusted
Joined: Tue, 02 Aug 2011
Posts: 4598
Team: HashKiller
Reputation: 2982 Reputation
Offline
Tue, 10 Sep 2013 @ 14:11:15

hash-ire said:

Did I miss anything? Have you really bruteforced 8^24 possible combinations?

Done a few at 8^26 too ... takes ages and costs a lot of money in electricity though


Please read the forum rules. | Please read the paid section rules.

BTC: 1MmWESN5bKZ1YSuHrm5uNwnQYxWyQnEQ6E

Avatar
zdz

Status: n/a
Joined: Sun, 26 May 2013
Posts: 11
Team:
Reputation: 4 Reputation
Offline
Wed, 06 Nov 2013 @ 16:48:37

Good work guys, I've never failed to brute these VM's.

Two more to add to the list, rules holding...

nrgbupzd
kgywgtgk

-=zdz=-


Avatar
8E3B635F

Status: Trusted
Joined: Wed, 19 Feb 2014
Posts: 640
Team:
Reputation: 645 Reputation
Offline
Sun, 23 Feb 2014 @ 11:38:43

Sorry misread post


Avatar
coder_phil

Status: n/a
Joined: Tue, 17 Jun 2014
Posts: 12
Team:
Reputation: 0 Reputation
Offline
Wed, 18 Jun 2014 @ 20:17:52

Trying to crack one of these.Written a small program(cmd line) to strip output from crunch brute force based on the number of UNIQUE lower case letters that seem to be an essential feature of these pass phrases.
I have achieved upto 70% reduction in some files using this.Source code available.Wrote it because crunch didn't seem to have this feature.
Regards
Phil.


Avatar
Hash-IT

Status: Trusted
Joined: Tue, 02 Aug 2011
Posts: 4598
Team: HashKiller
Reputation: 2982 Reputation
Offline
Wed, 18 Jun 2014 @ 20:47:22

Hi coder_phil

There is a tool called patterngen here which does what you want.

Don't limit to 100% unique, I have cracked Virgin Media passwords with 3 identical characters throughout the password.


Please read the forum rules. | Please read the paid section rules.

BTC: 1MmWESN5bKZ1YSuHrm5uNwnQYxWyQnEQ6E

Avatar
coder_phil

Status: n/a
Joined: Tue, 17 Jun 2014
Posts: 12
Team:
Reputation: 0 Reputation
Offline
Wed, 18 Jun 2014 @ 21:54:02

Hash-IT said:

Hi coder_phil

There is a tool called patterngen here which does what you want.

Don't limit to 100% unique, I have cracked Virgin Media passwords with 3 identical characters throughout the password.


Hi Hash-IT,
Appreciate the link.
Currently only limiting to 5 UNIQUE letters from what I have seen which would fit?


Avatar
Hash-IT

Status: Trusted
Joined: Tue, 02 Aug 2011
Posts: 4598
Team: HashKiller
Reputation: 2982 Reputation
Offline
Wed, 18 Jun 2014 @ 22:12:24

OK

I'm not sure I understand what your last sentence means. All I was trying to say is that there can be up to 3 instances of the same character in these VM passwords.

Like abacadef <--- Just a made up one to show what I mean. "a" is present 3 times.


Please read the forum rules. | Please read the paid section rules.

BTC: 1MmWESN5bKZ1YSuHrm5uNwnQYxWyQnEQ6E

Avatar
coder_phil

Status: n/a
Joined: Tue, 17 Jun 2014
Posts: 12
Team:
Reputation: 0 Reputation
Offline
Wed, 18 Jun 2014 @ 23:25:27

Hash-IT said:

OK

I'm not sure I understand what your last sentence means. All I was trying to say is that there can be up to 3 instances of the same character in these VM passwords.

Like abacadef <--- Just a made up one to show what I mean. "a" is present 3 times.


Yeh,I understand.Have you ever seen a VM password with 4 instances? If not then my program will effectively cut the size down of each crunch output file that needs to be cracked.
Having said that I can change the variables in the program to target other routers more effectively.


Avatar
Hash-IT

Status: Trusted
Joined: Tue, 02 Aug 2011
Posts: 4598
Team: HashKiller
Reputation: 2982 Reputation
Offline
Wed, 18 Jun 2014 @ 23:28:17

I personally have never seen 4 and I think it is unlikely to happen.


Please read the forum rules. | Please read the paid section rules.

BTC: 1MmWESN5bKZ1YSuHrm5uNwnQYxWyQnEQ6E


13 Results - Page 1 of 1 -
1

We have a total of 215892 messages in 26393 topics.
We have a total of 23270 registered users.
Our newest registered member is Unknown777.