PDA

View Full Version : bruteforce wifi password device



swls
2022-05-22, 17:19
Hi, I train in ethical hacking both system and network level.


I'm trying to brute force my wifi password from my sfr box.


I managed to pull out a .cap wireshark file where I captured the handshake connection of a wifi device .


I attempted to use kali linux and find the password via a rockyou.txt password list, in 9h it didn't find the password.


https://ibb.co/6Y3PP1T
Indeed, it is a long password with alpha numeric character + "!".


I think it will be impossible to find it.
I converted the .cap file to then I ran on windows ashcat -a 3 -m 2500 ?2?2?2?2?2?2?2? hashcat-wpa2.hccapx






But it tells me that the 2500 plugin no longer exists so I replace it with 22000:


and it always gives me "No hashes loaded."


Same if I do "hashcat-6.2.5>hashcat -m 22000 -a 3 wpa2.hccapx d?d?d?d?d?d?d?d?"


https://ibb.co/hMkw4Bs


I am attaching a screenshot and the .cap file https://ufile.io/72klwxnn and converted to .hccapx to at least see if I captured it well and if it was not this step that screwed up








Thanks very much

Fred Sheehan
2022-08-11, 13:39
I'm presuming you already 'know' your own password, so why are you trying to brute force it?

If you are learning and want some 'proof of concept' set an easier far weaker and less complex wifi password and then have a go again at brute forcing that.

Using word files to brute force only works if the exact password is in the word file, and so this will often fail.

The time to crack a password based on wildcards, simply depends on the complexity and length of the password your trying to find, it may take longer to crack a decently complex and long password than you have time left on this earth...

Fireloks
2022-10-18, 02:54
99.999999999999% of the time, brute force does not work in the real world!