NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - WPA Packet Cracking - [solved] WPA2WPA-CCMP TKIP-PSK crack help


1 Results - Page 1 of 1 -
1
Author Message
Avatar
l3iggs

Status: n/a
Joined: Thu, 17 Oct 2013
Posts: 13
Team:
Reputation: 2 Reputation
Offline
Thu, 17 Oct 2013 @ 18:37:40

Capture file details:

$ pyrit -r ATT024_small.cap analyze
Pyrit 0.4.1-dev (svn r308) (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+

Parsing file 'ATT024_small.cap' (1/1)...
Parsed 9 packets (9 802.11-packets), got 1 AP(s)

#1: AccessPoint 90:b1:34:a6:e9:20 ('ATT024'):
#1: Station 40:b3:95:da:fe:41
#2: Station 84:38:35:55:98:8c, 1 handshake(s):
#1: HMAC_SHA1_AES, good, spread 1


I've tried the following with no luck:

$ crunch 8 8 0123456789 | pyrit -r wpa_dump-01.cap -e &quotATT024&quot -i - attack_passthrough
Crunch will now generate the following amount of data: 900000000 bytes
858 MB
0 GB
0 TB
0 PB
Crunch will now generate the following number of lines: 100000000
Pyrit 0.4.1-dev (svn r308) (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+

Parsing file 'wpa_dump-01.cap' (1/1)...
Parsed 10 packets (10 802.11-packets), got 1 AP(s)

Picked AccessPoint 90:b1:34:a6:e9:20 automatically...
Tried 100000000 PMKs so far; 16818 PMKs per second.

Password was not found.


Any help here would be greatly appreciated!


Edit: solved with ?d?d?d?d?d?d?d?d?d?d
edited by l3iggs on 19/10/2013


Attachments: Login to view attachments.

1 Results - Page 1 of 1 -
1

We have a total of 197456 messages in 24427 topics.
We have a total of 21698 registered users.
Our newest registered member is Advocat.