Sinisterly
Cracking WPA-SK - Printable Version

+- Sinisterly (https://sinister.ly)
+-- Forum: Hacking (https://sinister.ly/Forum-Hacking)
+--- Forum: Network Hacking (https://sinister.ly/Forum-Network-Hacking)
+--- Thread: Cracking WPA-SK (/Thread-Cracking-WPA-SK)



Cracking WPA-SK - Yung Lean - 07-15-2015

Wanted to ask possible to crack it ? How much effort does it take? Maybe quick info on how to do it would be useful.


RE: Cracking WPA-SK - Master - 07-15-2015

(07-15-2015, 07:35 PM)Yung Lean Wrote: Wanted to ask possible to crack it ? How much effort does it take? Maybe quick info on how to do it would be useful.

Quite a lot of work to put it off, you probably want to use Aircrack, if you want to attack for the outside, this article might useful. It would be much easy to social engineering you way into the target (Hello I work for {insert ISP name}, we are running critical tests on the system, should only need a minute with your router to reset everything) and then coping to WiFi password from the router as most people don't change the default router password, even if they did change it, just copy the admin password and the IP address to router control panel or reset the router with a pin.


RE: Cracking WPA-SK - Lysergide - 07-15-2015

I suggest first trying with Reaver, maybe you are lucky (I was when I tried).
Look here: http://lifehacker.com/5873407/how-to-crack-a-wi-fi-networks-wpa-password-with-reaver


RE: Cracking WPA-SK - mothered - 07-16-2015

(07-15-2015, 09:21 PM)Lysergide Wrote: I suggest first trying with Reaver, maybe you are lucky (I was when I tried).
Look here: http://lifehacker.com/5873407/how-to-crack-a-wi-fi-networks-wpa-password-with-reaver

That's provided the AP Is vulnerable to WPS.

I've had successful results with Reaver. When all goes well, It certainly beats the handshake methodology.


RE: Cracking WPA-SK - Eclipse - 07-17-2015

(07-16-2015, 02:44 PM)mothered Wrote: When all goes well, It certainly beats the handshake methodology.

What doesn't?


RE: Cracking WPA-SK - mothered - 07-17-2015

(07-17-2015, 01:03 AM)Eclipse Wrote: What doesn't?

When you get the good ol' "WPS transaction failed, re-trying last PIN" via Reaver, and you're left In somewhat of an endless loop until the PIN Is found and proceeds with further PINs thereafter.


RE: Cracking WPA-SK - Centizen - 10-23-2015

(07-16-2015, 02:44 PM)mothered Wrote: That's provided the AP Is vulnerable to WPS.

I've had successful results with Reaver. When all goes well, It certainly beats the handshake methodology.

Cracking WPS is lame in my opinion. You have to be in a close range to the router or it won't work.

@OP: Social engineering is a much more viable option. But then you require good social skills and experience, which I don't think you have.


RE: Cracking WPA-SK - Avarice - 11-15-2015

I suggest capturing a 4-way WPA/PSK handshake (message 1 and 2 required) using airodump-ng
Then using aircrack -J convert it to Hashcat hccap and then using hashcat to crack it.

WPA(2) keys tend to take quite a while to crack and a lot of effort if you have a random password.