большое спасибо, есть ли кто-нибудь, кого вы можете порекомендовать для расшифровки рукопожатия WPA2 PSK
as i can see you've already submitted your handshake to the free bruteforce thread here and they said your ISP default keys aren't brutable. you can try the paid thread maybe, but chances aren't high.
thank you so much , i struggle with the language but i understand now i will try the paid once, and as i said if it is possible to refer me to someone trusted i will submit there you are a great help , i appreciate it sir
since you've already posted your handshake to both free and paid threads here, i don't know where to refer you besides them, sorry. you can be sure people there checked the network against all common dictionaries possible. nobody will help with your (most likely used there) ISP default key, it may take years of guessing on gpu.
thank you again for the reply i tried all the available attacks ( rockyou , common list ect..) i will switch to some social engineering attacks plus our ISP isn't that involved in setting passwords i was surprised when i tried to locate the network on router scan and the AP was found which led me here, i learned alot about the community as well as that the BSSID isn't in the database, (funny enough i ran a WAN scan in hope i could find the router on the internet) yet our ISP runs on dynamic mode x)
Коллеги, приветствую! Подскажите пожалуйста для РТК роутера через поиск на 3wifi возможные пароли для: ESSID: RT-WiFi-A645 BSSID: 50:78:B3:87:A6:45 например так: 50:78:B3:87:A6:* Хочу понять подойдет ли для это AP брут.
SSID: TP-Link_8048 BSSID: D8:07:B6:B3:80:48 SSID: TP-Link_8014 BSSID: D8:07:B6:B3:80:14 Дайте пароль и пин от этих точек пожалуйста.
к сожалению брут не имеет смысла, это ZTE роутер, пасс из 8-ми знаков, в нём весь заглавный и строчный алфавит латиницы, все цифры от 0 до 9, это немыслимое количество комбинаций сам когда-то намеревался сбрутить такую точку, но вот что-то бросил эту затею данные роутеры хорошо чпокаются через роутер скан, но только в одном случае, если ты сможешь узнать, в каком диапазоне адресов висит нужный тебе, и не скрыт ли он за NAT'ом (а вот ростелекомовские-то, как раз чаще всего скрыты)
Spoiler: pass D8:07:B6:B3:80:48 2020-11-24 key "36502097" wps "36502097" D8:07:B6:B3:80:14 2020-11-01 key "97323648" wps "97323648"
полноценный сервис 3wifi сейчас недоступен, у меня доступ к базе через api поэтому не могу по маске запрос сделать, только по полному bssid (этой конкретной точки в базе нет)
social engineering is a good idea, if you have linux skills you may try evil twin (google "evil twin attack" and "fluxion"), i think it's the best bet in your situation. also if there is wps turned on you may try oneshot or reaver. some old routers are even brutable via wps pin, though new ones will lock after 3-4 failed attempts. 3wifi has wps online generator tool, based on database statistical analysis, below is the result for your AP. but score is too low, about 0.5% success probability for the highest one. Spoiler: wps B4:82:FE:9F:95:F2 name "Static PIN" value "10826041" score 0.0056367657053911 name "Static PIN" value "13948696" score 0.0041148749131852 name "Static PIN" value "79020572" score 0.00081567996255996
Brother you are a great help , so i m planning on running an evil twin attack i already know it and i m good at linux actually i run Kali as my OS x) the thing is i lack another wifi adapter so i will manage to get one and HIT IT !! about WPS, unfortunately it is off, if it was on i could've run pixie dust well, this network is WPA2-PSK (TKIP) considered weak, yet still looking for a method that takes advantage of this encryption, if you got further ideas please i appreciate your input \(゚ー゚\) also found this: key reinstallation attacks (KRACKs) will practice it and update you x)
на момент добавления в базу точка была открытой, есть только пин Spoiler: pass 2015-12-09 key "<empty>" wps "44034016"
Spoiler: pass FA:F0:82:A9:97:88 2018-12-09 key "338674117" wps "" 00:1F:CE:55:A2:B6 2018-04-30 key "77666787740" wps "18836486"