NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Wireless Cracking - ee bright box


9 Results - Page 1 of 1 -
1
Author Message
Avatar
simonp

Status: n/a
Joined: Mon, 10 Nov 2014
Posts: 12
Team:
Reputation: 0 Reputation
Offline
Mon, 10 Nov 2014 @ 12:44:17

Hi guys im new to this
Im trying to test the wpa2 psk key of a ee brightbox
Ive been useing kali linux c0wpatty and genpmk

and following this tutorial

://null-byte.wonderhowto.com/how-to/hack-wi-fi-cracking-wpa2-psk-passwords-with-cowpatty-0148423/

Ive ran airmon-ng start wlan0 cmd and monitored my network connections

Now when the handshake is captured should it tell me in the new capture terminal window ive just opened with command airodump-ng --bssid 00:25:9C:97:4F:48 -c 9 -w cowpatty mon0 as it says in the tutorial i followed

as i was captureing last night from the ee brightbox and i also captured from another test network i setup myself and both times it wouldnt change to wpa handshake 00:00:00:00:00:00 (example) meaning its captured in the cap log but it would only show as captured in the monitor window with all the ssids and clients

i also hashed both network ssids with genpmk and tried running the

cowpatty -d hashfile -r dumpfile -s ssid command with no sucess


Also to grab the handshake does the router login need to be entered manually or just a user turning there wifi on and useing the router
thats already connected beore
I have the cap files of both networks

is it wrong to clean the cap files as ive read on here some people have said dont do it

does is matter if i use .txt or .lst files for the dictionary

i think i may be going wrong with the dictionary files

im using wordlists built into kali and have downloaded some others too that are in .txt format

output.txt
hashkiller-dict.txt
psyc0packv2


cap01 EE-BrightBox-hpjga2 18:83:BF:50:9A:11 CH6

Any help would be appreciated

Simon


Avatar
Hash-IT

Status: Trusted
Joined: Tue, 02 Aug 2011
Posts: 4598
Team: HashKiller
Reputation: 2982 Reputation
Offline
Mon, 10 Nov 2014 @ 13:12:50

There is a good thread here to show you the likely password for brightbox routers.

To capture a handshake use airodump.

Assuming your router is on channel 1 with BSSID of 00:11:22:33:44:55 and you use mon0

airodump-ng -c 1 -w capturefile --bssid 00:11:22:33:44:55 mon0

Wait for a client to connect to the router. If there is already a client, assuming the same router as above do this.

Client is the BSSID of the client.

aireplay-ng -0 1 -a 00:11:22:33:44:55 -c Client mon0

This will deauth the client and force them to reconnect, this will help to capture a handshake.

Once you have a handshake, do this, assuming you called your capture file "capturefile".

aircrack-ng capturefile -J capturefileCleaned.hccap

Use the .hccap file with oclhashcat and the lists provided in the link above.


Please read the forum rules. | Please read the paid section rules.

BTC: 1MmWESN5bKZ1YSuHrm5uNwnQYxWyQnEQ6E

Avatar
simonp

Status: n/a
Joined: Mon, 10 Nov 2014
Posts: 12
Team:
Reputation: 0 Reputation
Offline
Mon, 10 Nov 2014 @ 13:44:07

Thanks bro we got there in the end lol


Avatar
Hash-IT

Status: Trusted
Joined: Tue, 02 Aug 2011
Posts: 4598
Team: HashKiller
Reputation: 2982 Reputation
Offline
Mon, 10 Nov 2014 @ 13:50:55

LOL

Once you have cracked your .hccap please upload the password to the thread I linked to above.

user is doing a great job of compiling a list of all known passwords for brightbox, the more we have the better.


Please read the forum rules. | Please read the paid section rules.

BTC: 1MmWESN5bKZ1YSuHrm5uNwnQYxWyQnEQ6E

Avatar
simonp

Status: n/a
Joined: Mon, 10 Nov 2014
Posts: 12
Team:
Reputation: 0 Reputation
Offline
Mon, 10 Nov 2014 @ 14:03:22

Ok thanks again
So for example if i think a password is a surname id get a surname txt file n run that?
Like the bright box ones so i can create my own txt file with surnames in and use that?
If i wanted to crack.a password thats say be3e6b8383 What sort of dictionary would i use
Is oclhashcat in kali linux

Simon


Avatar
Hash-IT

Status: Trusted
Joined: Tue, 02 Aug 2011
Posts: 4598
Team: HashKiller
Reputation: 2982 Reputation
Offline
Mon, 10 Nov 2014 @ 14:06:27

If you read the thread I linked to about brightbox you will see it is unlikely to be a surname as a password. It can of course be anything, but if the user left it as default then the password will look like the following.


horse-duck-dog
route-know-apt
guest-mean-apt
nerve-pick-six
truck-rank-few
cash-sting-six
vase-boast-own
farm-blend-own
want-dwell-fit
curb-appal-top
wait-rob-weary
dog-duck-horse
ant-stab-ideal
gum-sleep-free
pea-share-nice
leg-draft-good
use-teach-thin
toe-guard-calm
alarm-rub-male
label-fan-cool


Please read the forum rules. | Please read the paid section rules.

BTC: 1MmWESN5bKZ1YSuHrm5uNwnQYxWyQnEQ6E

Avatar
simonp

Status: n/a
Joined: Mon, 10 Nov 2014
Posts: 12
Team:
Reputation: 0 Reputation
Offline
Mon, 10 Nov 2014 @ 14:12:37

I just ment surnames in general buddy nothin to do with the bright box
Now i no to use the brightbox list it should take no.time to crack right

So what sort of txt file would i use for a password like be3e6b8383
Pls any normal txt file with characters and numbers in

Simon


Avatar
Hash-IT

Status: Trusted
Joined: Tue, 02 Aug 2011
Posts: 4598
Team: HashKiller
Reputation: 2982 Reputation
Offline
Mon, 10 Nov 2014 @ 14:24:51

simonp said:


Now i no to use the brightbox list it should take no.time to crack right

Only if you have a powerful group of GPU's. Otherwise it could take days, or weeks.

simonp said:


So what sort of txt file would i use for a password like be3e6b8383

You would not use a text file for these sorts of passwords. It would be too large to store on your hard drive. This question is basic oclhashcat usage, you should really read the oclhashcat wiki.

As a simple explanation you would use code similar to this and not use text files.

oclhashcat.exe - 1 ?a ?1?1?1?1?1?1?1?1?1?1


Please read the forum rules. | Please read the paid section rules.

BTC: 1MmWESN5bKZ1YSuHrm5uNwnQYxWyQnEQ6E

Avatar
27E8AD74
Administrator
Status: n/a
Joined: Sat, 29 Dec 2012
Posts: 3094
Team:
Reputation: 5065 Reputation
Offline
Mon, 10 Nov 2014 @ 17:30:37

Edited out..



9 Results - Page 1 of 1 -
1

We have a total of 210261 messages in 25832 topics.
We have a total of 22908 registered users.
Our newest registered member is voztok94.