Unfortunately my word list is not big enough.
Here is the hash: 0BBDE92B8E9B6E4A657761F0BC166DD2
Forum Thread: Can Someone Help Me Decrypt This NTLM Hash?
- Hot
- Active
-
Forum Thread: How to Find Admin Panel Page of a Website? 14 Replies
7 hrs ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 22 Replies
17 hrs ago -
Forum Thread: Hack Instagram Account Using BruteForce 207 Replies
1 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
1 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
1 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
1 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
2 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
2 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
2 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
2 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
3 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
3 mo ago -
Forum Thread: How to Run and Install Kali Linux on a Chromebook 18 Replies
4 mo ago -
Forum Thread: can i run kali lenux in windows 10 without reboting my computer 4 Replies
5 mo ago -
Forum Thread: How to Hack School Website 11 Replies
5 mo ago -
Forum Thread: Make a Phishing Page for Harvesting Credentials Yourself 8 Replies
5 mo ago -
Forum Thread: Creating an Completely Undetectable Executable in Under 15 Minutes! 38 Replies
6 mo ago -
Forum Thread: Hacking with Ip Only Part [1] { by : Mohamed Ahmed } 5 Replies
7 mo ago -
Forum Thread: Problem with Airmon-Ng and VM 3 Replies
7 mo ago -
Forum Thread: Which one is Animal Picture Is Inside in Kali Linux Wallpaper 3 Replies
10 mo ago
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Brute-Force FTP Credentials & Get Server Access
-
How To: Dox Anyone
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Use Ettercap to Intercept Passwords with ARP Spoofing
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How To: Automate Wi-Fi Hacking with Wifite2
-
How To: Generate Crackable Wi-Fi Handshakes with an ESP8266-Based Test Network
-
How To: Use Photon Scanner to Scrape Web OSINT Data
-
Hacking macOS: How to Create a Fake PDF Trojan with AppleScript, Part 1 (Creating the Stager)
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
How To: Hack 5 GHz Wi-Fi Networks with an Alfa Wi-Fi Adapter
-
How To: Extract Bitcoin Wallet Addresses & Balances from Websites with SpiderFoot CLI
-
How To: Write an XSS Cookie Stealer in JavaScript to Steal Passwords
5 Responses
Sorry, I am unable to crack something like that yet either. I'm still compiling a wordlist myself. I figure if I might have to wait several days, the wordlist that I use should cover nearly all of the bases, so I don't check the progress after 2-4 days and see that nothing was accomplished.
I'm using the "rockyou.txt" as a starting point and then adding wordlists to the pile as I find good ones. I was thinking to maybe get a bunch of lists together that'll cover wpa/wpa2 authentication passwords that're 8-32 characters in length (low letters,CAPITAL LETTERS, the numbers 0-9 and some symbols). After I get the wordlists together, I'll clean it of duplicates and sort it according to known statistical rules, etc. Then, I'll divide up the one large file into smaller ones that're around 5MB in size.
I posted to your thread because I was curious, is that hash a wpa/wpa2 hash? If so, is there a way that we can know (by the length of the hash) what the length of the password must be (or at least in a near ballpark)? I remember reading somewhere that most are 128 bit, but I can't recall what that number pertained to exactly.
Also, did you get that hash from one of the four packets in an EAPOL handshake? If so, did it come from the 3rd packet? What was the field name of that value (was it the (wireshark's middle pane) "> 802.1x Authentication > WPA Key Data:" field value?) ?
Sorry I only had questions and not an answer to trade for them. I do recall seeing an online site that supposedly could crack wpa/wpa2 encrypted keys, but that was a few weeks before I got into learning about this stuff and I haven't even been able to track down a decent site that's similar to it yet.
I've got about 2 dozen valid captures, but no way to crack any of them, so I'm compiling the wordlist and then I'm gonna try either aircrack-ng or hashcat.
I almost forgot to ask you... What's the total size of the wordlist that you tried, and what type of passwords will it cover (ie- an example answer might be something like, "It's 20GB total, divided into 5MB smaller files. I made some of it in Crunch and dll'd others to get the final list. It's geared toward authentication passwords that're 8-64 characters in length, and they can possibly be made of the letters/numbers/symbols: a-z, A-Z, 0-9, about %50 of the symbols on a QWERTY keyboard _/\";$#%&*().
Thanks for the reply, I got this hash from a SAM file. The password length is between 6-8 characters, and I think it only contains letters, capital letters and numbers.
Oh, I didn't remember SAM files, until you mentioned it. That's where Linux stores passwords, isn't it? I've read alot of stuff about a lot of different things but don't retain most of it unless it's something that actually pertains to my situation at the time.
Windows stores the passwords in SAM files and it is encrypted with LM or NT algorithms, mostly NT in newer windows versions.
Share Your Thoughts