Results 1 to 4 of 4

Thread: bruteforce wifi password device

  1. #1
    Join Date
    2022-May
    Posts
    2

    Question bruteforce wifi password device

    Hi, I train in ethical hacking both system and network level.


    I'm trying to brute force my wifi password from my sfr box.


    I managed to pull out a .cap wireshark file where I captured the handshake connection of a wifi device .


    I attempted to use kali linux and find the password via a rockyou.txt password list, in 9h it didn't find the password.


    https://ibb.co/6Y3PP1T
    Indeed, it is a long password with alpha numeric character + "!".


    I think it will be impossible to find it.
    I converted the .cap file to then I ran on windows ashcat -a 3 -m 2500 ?2?2?2?2?2?2?2? hashcat-wpa2.hccapx






    But it tells me that the 2500 plugin no longer exists so I replace it with 22000:


    and it always gives me "No hashes loaded."


    Same if I do "hashcat-6.2.5>hashcat -m 22000 -a 3 wpa2.hccapx d?d?d?d?d?d?d?d?"


    https://ibb.co/hMkw4Bs


    I am attaching a screenshot and the .cap file https://ufile.io/72klwxnn and converted to .hccapx to at least see if I captured it well and if it was not this step that screwed up








    Thanks very much

  2. #2
    Join Date
    2021-May
    Location
    UK
    Posts
    784
    I'm presuming you already 'know' your own password, so why are you trying to brute force it?

    If you are learning and want some 'proof of concept' set an easier far weaker and less complex wifi password and then have a go again at brute forcing that.

    Using word files to brute force only works if the exact password is in the word file, and so this will often fail.

    The time to crack a password based on wildcards, simply depends on the complexity and length of the password your trying to find, it may take longer to crack a decently complex and long password than you have time left on this earth...

  3. #3
    Join Date
    2021-Apr
    Posts
    1
    99.999999999999% of the time, brute force does not work in the real world!

  4. #4
    Join Date
    2023-Jan
    Posts
    2
    You really don't want to bruteforce. It takes a long time.
    Use dictionary attacks instead with different rules. I highly recommend Hashcat. It supports CUDA so it'll use your precious Nvidia graphics card to do all the calculating. It's super sophisticated and I get around 700,000-800,000 keys tested per seconds with my GTX 3080 card in WPA2 mode.

Similar Threads

  1. bruteforce wifi password device
    By swls in forum General Archive
    Replies: 1
    Last Post: 2022-06-04, 18:54
  2. Replies: 0
    Last Post: 2020-02-25, 17:38

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •