Results 1 to 8 of 8

Thread: Find handshake: help find password

  1. #1
    Just burned his ISO
    Join Date
    Jun 2008
    Posts
    14

    Default Find handshake: help find password

    Hi,
    finally yesterday I got the handshake of my friend network (WPA).
    The problem is that I can't find the password. I tried many files without success.
    So I'm asking your help.
    Can I attach the file .cap (and .txt) captured with airodump-ng to let you to help me to find the password?
    Thanks

  2. #2
    Senior Member
    Join Date
    Apr 2008
    Posts
    2,008

    Default

    Quote Originally Posted by spinmar View Post
    Hi,
    finally yesterday I got the handshake of my friend network (WPA).
    The problem is that I can't find the password. I tried many files without success.
    So I'm asking your help.
    Can I attach the file .cap (and .txt) captured with airodump-ng to let you to help me to find the password?
    Thanks
    Note that you need the permission of your "friend" to crack his network and since we on the forum can not verify that you indeed have this, you will not find anyone willing to help crack your pcap file and thereby take the risk of being an accomplice in crime.

    Posting the pcap file will also be against the rules of this forum and the link/attachment will be removed in order to protect our members.
    -Monkeys are like nature's humans.

  3. #3
    Just burned his ISO
    Join Date
    Jun 2008
    Posts
    14

    Default

    I knew that you replied in this way and I didn't attach anything
    What should I ask to my friend to let you know I have the permission?

  4. #4
    Senior Member
    Join Date
    Apr 2008
    Posts
    2,008

    Default

    Quote Originally Posted by spinmar View Post
    I knew that you replied in this way and I didn't attach anything
    What should I ask to my friend to let you know I have the permission?
    There is nothing you can ask him or tell us that would beyond reasonable doubt prove to us that you have the right to access the network that the cap file was collected for. Consequently there will never be a situation where you are allowed to post a cap file on this forum asking for help with cracking a WEP or WPA passphrase.
    -Monkeys are like nature's humans.

  5. #5
    Just burned his ISO
    Join Date
    Jun 2008
    Posts
    14

    Default

    Quote Originally Posted by =Tron= View Post
    There is nothing you can ask him or tell us that would beyond reasonable doubt prove to us that you have the right to access the network that the cap file was collected for. Consequently there will never be a situation where you are allowed to post a cap file on this forum asking for help with cracking a WEP or WPA passphrase.
    Ok, I'll continue to try myself for 2 days...
    but I'll suspect that my friend will win .. the pizza

  6. #6
    Senior Member
    Join Date
    Apr 2008
    Posts
    2,008

    Default

    Quote Originally Posted by spinmar View Post
    Ok, I'll continue to try myself for 2 days...
    but I'll suspect that my friend will win .. the pizza
    In case he was allowed to change his password before the start of the challenge, or he already had implemented a strong password, he had pretty much won the pizza before the challange even started. He could easily utilize all allowed characters in a random 63 character password, making your chances of ever finding the passphrase slim to none.
    -Monkeys are like nature's humans.

  7. #7
    Just burned his ISO
    Join Date
    Jun 2008
    Posts
    14

    Default

    Before paying the pizza to my friend I'm trying to play my last chance
    I downloaded the 3 GB password list.
    I saw the tutorial video and it seems that using airolib-ng is much faster than airecrack -w.
    So I divided the 3 GB in three parts, each one of 100 million entry.
    I imported the first part in airolib-ng and then I type the batch option.
    Well with 100 million of passwords, my pc needs about 5 days to finish the batch option....
    I have a core duo E6600 with 2 GB Ram 667 Mhz and ubuntu 8.0.4.
    I thought it took less time and it is only the first file.....
    Is it normal?

  8. #8
    Senior Member
    Join Date
    Apr 2008
    Posts
    2,008

    Default

    Yes this is perfectly normal. What you seem to have missed, and believe me you are not the first, is that although using a precomputed hashtable with airolib-ng will be much faster than the same process with a wordlist you will first need to compute the hashes. The actual calculation of the hashes will, in the same way as using a wordlist, be a slow and CPU intense process.

    The outcome of this is that unless you already have a hashtable for the particular SSID or intend to use the same dictionary against it multiple times, you will be better of simply running the wordlist as it is against the captured handshake.
    -Monkeys are like nature's humans.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •