When I first started using linux about half a year ago all I wanted to do was crack wifi passwords until I realised that there were much better things to do. However, recently I've been reading about rainbow tables and have seen the way they work etc and how they are much faster. I wanted to generate a table from a dictionary I had made a long time ago, and read that when using genpmk you need the essid of the router as a salt for the hashes. That made me wonder, when doing an ordinary dictionary attack on a handshake with aircrack, are salts used somehow? Same with brute force attacks. I have never seen any options to use a salt, and have never needed to with wifi before. Is the essid already in the cap file? Or does it simply not use one?
Forum Thread: Do WPA Dictionary Attacks Use Salts?
- Hot
- Active
-
Forum Thread: Free Proxy Servers? 9 Replies
4 hrs ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 32 Replies
1 day ago -
Forum Thread: 12 Ways How to Hack Any Social Network and Protect Yourself 2018 1 Replies
1 day ago -
Metasploit Error: Handler Failed to Bind 40 Replies
4 days ago -
Forum Thread: How to Know if You Are a Script Kiddie? 9 Replies
2 wks ago -
Forum Thread: How to Identify and Crack Hashes 8 Replies
2 wks ago -
Forum Thread: How to Hack School Website 8 Replies
3 wks ago -
Forum Thread: Whenever I Try "Airmon-Ng Start wlan0" There's an Error? 16 Replies
3 wks ago -
Forum Thread: How to Fix 'Failed to Detect and Mount CD-ROM' Problem When Installing Kali Linux 14 Replies
3 wks ago -
Forum Thread: Awesome Keylogging Script - BeeLogger 30 Replies
1 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 27 Replies
1 mo ago -
Forum Thread: Complete Guide to Creating and Hosting a Phishing Page for Beginners 48 Replies
1 mo ago -
Forum Thread: Create and Use Android/Meterpreter/reverse_tcp APK with Msfvenom? 121 Replies
1 mo ago -
How to: Minecraft DoS'Ing with Python. 1 Replies
2 mo ago -
Forum Thread: HELP I Created an Apk for Hacking My Phone Using Kali Linux in Virtual Box How Can I Install That Apk on My Phone 17 Replies
2 mo ago -
Forum Thread: Tools for Beginner Hacker 3 Replies
2 mo ago -
Forum Thread: How to Embed an Android Payload in an Image? 9 Replies
3 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 46 Replies
3 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 11 Replies
3 mo ago -
Forum Thread: Fix Initramfs Problem 5 Replies
3 mo ago
-
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Hack Android Using Kali (Remotely)
-
How To: Bypass File Upload Restrictions on Web Apps to Get a Shell
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
How To: Hack a Site Knowing a Bit of HTML (hackthissite.org) Part 1
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
Hacking Windows 10: How to Dump NTLM Hashes & Crack Windows Passwords
-
Tutorial: Create Wordlists with Crunch
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
Hack Like a Pro: How to Crack Online Web Form Passwords with THC-Hydra & Burp Suite
-
How To: Create a Persistent Back Door in Android Using Kali Linux:
-
How To: Exploit Shellshock on a Web Server Using Metasploit
-
How To: There Are Hidden Wi-Fi Networks All Around You — These Attacks Will Find Them
-
How To: Use Beginner Python to Build a Brute-Force Tool for SHA-1 Hashes
-
How To: Catch an Internet Catfish with Grabify Tracking Links
4 Responses
An advice: you can find lots of useful information about password cracking in the hashcat forum.
That is correct. The ESSID is the salt, so unless someone is using a standard ESSID such as Netgear, the rainbow tables will not work. There are, however, already built rainbow tables of the top 1000 ESSID's.
So dictionary attacks use an ESSID from the cap file??
Yes
Share Your Thoughts