Silk Road forums

Discussion => Security => Topic started by: trava on August 02, 2012, 05:28 pm

Title: WPA2-PSK hack
Post by: trava on August 02, 2012, 05:28 pm
Im not a complete noob at this cos i managed to hack my neighbors WEP secured wifi using backtrack linux command line, but i cant seem to be able to crack WPA2

can someone help me out or lead me onto the right track  :)

Title: Re: WPA2-PSK hack
Post by: piy on August 02, 2012, 06:26 pm
reaver ;)
WPS must be enabled though
Title: Re: WPA2-PSK hack
Post by: trava on August 03, 2012, 12:07 am
thanks alot m8 certainly put on the right track :P
Title: Re: WPA2-PSK hack
Post by: oscarzululondon on August 03, 2012, 12:25 am
reaver ;)
WPS must be enabled though

I love doing this to people who are like "herp derp my WPA can't be cracked". Especially since reaver works really fast. Infact I think the process is simpler than cracking WEP, although slightly longer. It's amazing the number of people who leave WPS enabled as well, I'm yet to find anyone who has disabled it.
Title: Re: WPA2-PSK hack
Post by: piy on August 03, 2012, 12:40 am
Gotta love that WPS exploit, able to brute force every possible pin within hours.
Surprisingly, it's only worked for 1 router with me.

Cracking WPA handshakes are no fun, especially without a cluster:
[262:36:07] 231363868 keys tested (213.12 k/s)
That's over 10 days straight trying to crack the damn thing, and still going for most likely a worthless effort.
Title: Re: WPA2-PSK hack
Post by: oscarzululondon on August 03, 2012, 12:43 am
Gotta love that WPS exploit, able to brute force every possible pin within hours.
Surprisingly, it's only worked for 1 router with me.

Cracking WPA handshakes are no fun, especially without a cluster:
[262:36:07] 231363868 keys tested (213.12 k/s)
That's over 10 days straight trying to crack the damn thing, and still going for most likely a worthless effort.

Have you tried the new cloud cluster GPU services? They can brute force most WPA handshakes in 30 mins. I'm not up to date on the latest services but they're easy to find and I can point you in the direction of a few if you need.
Title: Re: WPA2-PSK hack
Post by: piy on August 03, 2012, 12:56 am
I did try a free online WPA cracking service, which seemed to only use a rainbow table for the SSID I had tried previously.
I also saw a couple paid services that seemed promising, one actually utilized bitcoin to initiate the cracking, but not really looking to pay to get it cracked.
If there's a good free service out there, I'd certainly give it a shot.

I should've also mentioned this awesome python script for the OP: wifite.py
code.google.com/p/wifite/
Definitely worth checking out if you haven't yet. It brings the word "skiddy" to a whole new level.
Title: Re: WPA2-PSK hack
Post by: random0 on August 03, 2012, 01:21 am
If you are serious, and can't reaver fails you can try to build a personalised  password list.
Locate the owner of the AP. You can do this with your smart phone, check the name and dig up the net for info on it, hobbys etc and build a passw list vased on that.
Or ttry to hack one of his online accounts and hope he/she uses the same passw.
Or follow the cables and intercept the traffic with a hardware.
Title: Re: WPA2-PSK hack
Post by: sourman on August 03, 2012, 02:55 am
There were lots of popular routers that kept WPS on even if you disabled it. New firmware should fix the problem, though the typical end user doesn't even know what firmware is.