Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


handshake filter_list
Author
Message
handshake #1
am new to this and i have cracked wep with ease but have had no luck with wpa2 . am using back track 5r3 with vmware .. so unlike cracking a wep collecting packets for the iv's when carcking wpa2 all you need to grab is 1 handshake ? is that the idea and not collecting packets. i have a few .cap files that i collected with handshakes and had no luck cracking them. there wpa2's am trying to crack is there a special word list i have to use for that ?

[+] 1 user Likes jemmusic's post
Reply

RE: handshake #2
Please use the search function before posting this has been discussed many times most recently here

Reply

RE: handshake #3
You can go to the thread that chmod gave to see the WPA2 brute force attack tutorial. But to answer to your question, wpa2 is harder tro crack. You have two type of attack: the dictionnary comparison and the brute force attack.

If you want to crack WPA2 with dictionnary, the key MUST be in the dictionnary used for cracking.

If you use brute force by random generation, it will take a long time if you don't know anything about the key. The way to do it less longer (if the wpa2 key is the factory one) is to find the manufacturer of the router and find the composition of this factory key. Then you will know the type (numeric/alpha-alphanumeric) and the lenght of the key. You will write the possible character and the word generator will do all the possible combinations with these characters till finding the key.

Hope that my explanation was simple and precise ! Smile

Reply

RE: handshake #4
(11-04-2012, 07:15 PM)hunt3r972 Wrote: You can go to the thread that chmod gave to see the WPA2 brute force attack tutorial. But to answer to your question, wpa2 is harder tro crack. You have two type of attack: the dictionnary comparison and the brute force attack.

If you want to crack WPA2 with dictionnary, the key MUST be in the dictionnary used for cracking.

If you use brute force by random generation, it will take a long time if you don't know anything about the key. The way to do it less longer (if the wpa2 key is the factory one) is to find the manufacturer of the router and find the composition of this factory key. Then you will know the type (numeric/alpha-alphanumeric) and the lenght of the key. You will write the possible character and the word generator will do all the possible combinations with these characters till finding the key.

Hope that my explanation was simple and precise ! Smile

thanks i found a wpa dictionary to use an the router am trying to crack is a belkin

Reply

RE: handshake #5
Dictionary attack hasn't a lot of chance to succeed, brute force is more effective if you have an idea about the key.

For example I tried to crack the WPA2 key of a friend (to show him how it WPA2 cracking works of course). His password was Lamentin. The word lamentin was in the dictionnary but he just put the frist l in caps and the wpa2 cracking didn't work...

Reply

RE: handshake #6
(11-04-2012, 08:09 PM)hunt3r972 Wrote: Dictionary attack hasn't a lot of chance to succeed, brute force is more effective if you have an idea about the key.

For example I tried to crack the WPA2 key of a friend (to show him how it WPA2 cracking works of course). His password was Lamentin. The word lamentin was in the dictionnary but he just put the frist l in caps and the wpa2 cracking didn't work...

tried dictionary and failed.... hmmm dont wanna say i give up but its leaning that way lol.... i havent a clue what the pw could be its a stranger .. how do i use brute force ? what proggie

Reply

RE: handshake #7
All depends on your list man.
" I am the figure shrouded in the BlackM1st"

Reply

RE: handshake #8
I told you, dictionary doesn't work everytime... this is the brute force way

http://www.hackcommunity.com/Thread-So-y...incomplete

Quote:/pentest/passwords/crunch/crunch 7 14 abcdefghijklmonpqrstuvwxyzABCDEFGHIJKLMONPQRSTUWXYZ0123456789 -u | aircrack-ng -a 2 -b 00:00:00:00:00:00 -l file.txt -w- capture.cap

it can be very long (over 10 hours). It will generate a dictionary with the lenght you want (here every possibilities with 7,8,9,10,11,12,13,14 chars). Then it will start cracking and trying to find the key.

Reply

RE: handshake #9
(11-05-2012, 02:05 AM)hunt3r972 Wrote: I told you, dictionary doesn't work everytime... this is the brute force way

http://www.hackcommunity.com/Thread-So-y...incomplete

Quote:/pentest/passwords/crunch/crunch 7 14 abcdefghijklmonpqrstuvwxyzABCDEFGHIJKLMONPQRSTUWXYZ0123456789 -u | aircrack-ng -a 2 -b 00:00:00:00:00:00 -l file.txt -w- capture.cap

it can be very long (over 10 hours). It will generate a dictionary with the lenght you want (here every possibilities with 7,8,9,10,11,12,13,14 chars). Then it will start cracking and trying to find the key.

using this cammand
/pentest/passwords/crunch/crunch 7 14 abcdefghijklmonpqrstuvwxyzABCDEFGHIJKLMONPQRSTUWXYZ0123456789 -u | aircrack-ng -a 2 -b 00:00:00:00:00:00 -l file.txt -w- capture.cap
reading packest please wait .... its been like this for 10 minutes is this normal ?

Reply

RE: handshake #10
Yes, I asked to chmod and he explained me that you have to wait because it's generating the dictionary. I've the same issue and I never wait a complete brute force cracking so I don't really know if this is effective (I'm not patient :-/ ) you should wait and tell me the answer so Biggrin

I tried with the lenght 14 14 and it started instantly so I think that chmod is right about this. The dictionary generation is long and you have to wait

Reply







Users browsing this thread: 3 Guest(s)