NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - WPA Packet Cracking - Please help me with cracking WPA-PSK handshake!


5 Results - Page 1 of 1 -
1
Author Message
Avatar
jessanil

Status: n/a
Joined: Fri, 18 Oct 2013
Posts: 4
Team:
Reputation: 0 Reputation
Offline
Fri, 18 Oct 2013 @ 23:13:39

Hi guys, I have two handshake files that I've obtained from CommView. I know that these are the files needed to crack the password but I'm not sure on how to it. I'm not using a linux system so I can't really aircrack it or backtrack it. So I was wondering if anyone who is experienced with cracking WPA passwords could help with with cracking these wifi passwords. Thank you in advance!

1.
ESSID: ATT992
Security: WPA2-PSK
Frequency: 802.11n

2.
ESSID: obhome

Security: WPA2-PSK
Frequency: 802.11n


I do not have the .hccap file for &quotobhome&quot because the hashcat website won't let me convert it


Attachments: Login to view attachments.
Avatar
l3iggs

Status: n/a
Joined: Thu, 17 Oct 2013
Posts: 13
Team:
Reputation: 2 Reputation
Offline
Sat, 19 Oct 2013 @ 18:45:15

ATT992:1639816296


Avatar
jessanil

Status: n/a
Joined: Fri, 18 Oct 2013
Posts: 4
Team:
Reputation: 0 Reputation
Offline
Sun, 20 Oct 2013 @ 06:04:52

l3iggs: first of all, thank you so much for helping me with this! you're a lifesaver!;DDD Second, could you tell me what program you used to crack the password? Or if not a program, what was the method you used? Thank you!!


Avatar
l3iggs

Status: n/a
Joined: Thu, 17 Oct 2013
Posts: 13
Team:
Reputation: 2 Reputation
Offline
Sun, 20 Oct 2013 @ 19:06:31

I know from experience that networks that look like ATTxxx default to having a 10 digit password. I used a program called hashcat to test every possible 10 digit password (called bruteforce method) against the handshake you provided. Eventually I found the right one.

The exact command I used is:
cudaHashcat-plus64.bin -a 3 -m 2500 ATT992.hccap ?d?d?d?d?d?d?d?d?d?d
under linux.

You should know that bruteforcing a key space of this size will typically take a very long time. I have access to a machine with a very large amount of GPU processing power which greatly accelerated the process.


Avatar
jessanil

Status: n/a
Joined: Fri, 18 Oct 2013
Posts: 4
Team:
Reputation: 0 Reputation
Offline
Wed, 23 Oct 2013 @ 23:31:59

hey guys, so after some tweaking, I was able to convert the .cap file of the obhome WPA handshake file to .hccap.

based on the same information I provided in the original post, could someone help me crack this WPA handshake? thank you guys so much!

ESSID: obhome
Security: WPA2-PSK
Frequency: 802.11n


Attachments: Login to view attachments.

5 Results - Page 1 of 1 -
1

We have a total of 197687 messages in 24451 topics.
We have a total of 21732 registered users.
Our newest registered member is jess4340.