Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


Cracking WPA-SK filter_list
Author
Message
Cracking WPA-SK #1
Wanted to ask possible to crack it ? How much effort does it take? Maybe quick info on how to do it would be useful.

Reply

RE: Cracking WPA-SK #2
(07-15-2015, 07:35 PM)Yung Lean Wrote: Wanted to ask possible to crack it ? How much effort does it take? Maybe quick info on how to do it would be useful.

Quite a lot of work to put it off, you probably want to use Aircrack, if you want to attack for the outside, this article might useful. It would be much easy to social engineering you way into the target (Hello I work for {insert ISP name}, we are running critical tests on the system, should only need a minute with your router to reset everything) and then coping to WiFi password from the router as most people don't change the default router password, even if they did change it, just copy the admin password and the IP address to router control panel or reset the router with a pin.
[Image: master645.png]

Life before death, strength before weakness, journey before destination.” ― The Way of Kings by Brandon Sanderson

Reply

RE: Cracking WPA-SK #3
I suggest first trying with Reaver, maybe you are lucky (I was when I tried).
Look here: http://lifehacker.com/5873407/how-to-cra...ith-reaver

Reply

RE: Cracking WPA-SK #4
(07-15-2015, 09:21 PM)Lysergide Wrote: I suggest first trying with Reaver, maybe you are lucky (I was when I tried).
Look here: http://lifehacker.com/5873407/how-to-cra...ith-reaver

That's provided the AP Is vulnerable to WPS.

I've had successful results with Reaver. When all goes well, It certainly beats the handshake methodology.
[Image: AD83g1A.png]

Reply

RE: Cracking WPA-SK #5
(07-16-2015, 02:44 PM)mothered Wrote: When all goes well, It certainly beats the handshake methodology.

What doesn't?

Reply

RE: Cracking WPA-SK #6
(07-17-2015, 01:03 AM)Eclipse Wrote: What doesn't?

When you get the good ol' "WPS transaction failed, re-trying last PIN" via Reaver, and you're left In somewhat of an endless loop until the PIN Is found and proceeds with further PINs thereafter.
[Image: AD83g1A.png]

Reply

RE: Cracking WPA-SK #7
(07-16-2015, 02:44 PM)mothered Wrote: That's provided the AP Is vulnerable to WPS.

I've had successful results with Reaver. When all goes well, It certainly beats the handshake methodology.

Cracking WPS is lame in my opinion. You have to be in a close range to the router or it won't work.

@OP: Social engineering is a much more viable option. But then you require good social skills and experience, which I don't think you have.

Reply

RE: Cracking WPA-SK #8
I suggest capturing a 4-way WPA/PSK handshake (message 1 and 2 required) using airodump-ng
Then using aircrack -J convert it to Hashcat hccap and then using hashcat to crack it.

WPA(2) keys tend to take quite a while to crack and a lot of effort if you have a random password.

Reply







Users browsing this thread: 1 Guest(s)