Brute force WiFi WPA2

Поделиться
HTML-код
  • Опубликовано: 25 ноя 2024
  • НаукаНаука

Комментарии • 1 тыс.

  • @davidbombal
    @davidbombal  3 года назад +74

    Need help? Join my Discord: discord.com/invite/usKSyzb
    Menu:
    Overview: 0:00
    Alfa Card Setup: 2:09
    Start Wifite: 2:48
    Select WiFi network: 3:31
    Capture handshake: 4:05
    Convert cap to hccapx file: 5:20
    Copy file to hashcat: 6:31
    Hashcat: 6:50
    View GPUs: 7:08
    hashcat options: 7:52
    Start hashcat: 8:45
    Cracked: 10:31
    It's really important that you use strong WiFi passwords. Otherwise it's easy to use hashcat and a GPU to crack your WiFi network. Make sure that you are aware of the vulnerabilities and protect yourself.
    Disclaimer: Video is for educational purposes only. All equipment is my own. Make sure you learn how to secure your networks and applications.
    Need help? Join my Discord: discord.com/invite/usKSyzb
    ================
    Network Adapters:
    ================
    Alfa AWUS036NHA: amzn.to/3qbQGKN
    Alfa AWUSO36NH: amzn.to/3moeQiI
    ================
    Previous videos:
    ================
    Kali Installation: ruclips.net/video/VAMP8DqSDjg/видео.html
    One command wifite: ruclips.net/video/TDVM-BUChpY/видео.html
    ================
    Connect with me:
    ================
    Discord: discord.davidbombal.com
    Twitter: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    RUclips: ruclips.net/user/davidbombal
    ================
    Support me:
    ================
    Join thisisIT: bit.ly/thisisitccna
    Or, buy my CCNA course and support me:
    DavidBombal.com: CCNA ($10): bit.ly/yt999ccna
    Udemy CCNA Course: bit.ly/ccnafor10dollars
    GNS3 CCNA Course: CCNA ($10): bit.ly/gns3ccna10
    ======================
    Special Offers:
    ======================
    Cisco Press: Up to 50% discount
    Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now.
    Link: bit.ly/ciscopress50
    ITPro.TV:
    itpro.tv/davidbombal
    30% discount off all plans Code: DAVIDBOMBAL
    Boson software: 15% discount
    Link: bit.ly/boson15
    Code: DBAF15P
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

    • @BurakMert15
      @BurakMert15 3 года назад

      Sir I love your videos thank you I am studying electronic and communication engineering and as a interest I am learning Kali Linux so i hope one day I can combine Kali Linux and electronic circuits to test some compony systems so o have a question is there any way to crack WPA/WPA2 ,complicated passwords like include capital letters , letters and numbers except John or evil twin or gigabytes of data password. Thank you

    • @yeruvavishnuvardhanreddy22
      @yeruvavishnuvardhanreddy22 3 года назад

      how to hack wifi using wsl2 kali linux ?

    • @coolissimo69
      @coolissimo69 3 года назад

      Your chair is sick, what is it mate?

    • @muhammadhaseeb6598
      @muhammadhaseeb6598 3 года назад

      what if wps is disabled. is still work or not?

    • @suryamauliadi-pribadi8529
      @suryamauliadi-pribadi8529 3 года назад

      I install kali linux 2020.3 in VMWare. And i never can use my wireless, I learn in other video on youtube but is not work. My wireless problem is more, that interface is nothing, not detect, can't scan. I try to download newest driver, follow people instruction, buy new wireless usb adapter. But all this step is not working, I can't scan other Wi-Fi. I try my wi-fi in windows, I try my wireless usb adapter in windows all going normally. Please help me , thank's

  • @elnelly16
    @elnelly16 3 года назад +37

    Hi @DavidBombal I just passed the CCNA 200-301 on 12-Dec-2020, with 947 points. Thank you so much your channel helped a lot to clarify some doubts. I am looking to continue learning and help other people. Thanks 👌🏾✨

    • @demonpandaz9405
      @demonpandaz9405 2 года назад +1

      Bruh I'm stuck on no hashes loaded in the last step also congrats on the ccna I've heard it's really hard

    • @momomaz2516
      @momomaz2516 8 месяцев назад +1

      Cant Even get to run it lol

  • @MuhammadLab
    @MuhammadLab 3 года назад +282

    Uh.. I feel want to sleep... It's 2:54 am now ... Bye David.. gud night

    • @davidbombal
      @davidbombal  3 года назад +110

      Sorry to keep you awake 😔

    • @kamivibra1
      @kamivibra1 3 года назад +4

      @@davidbombal your videos worth keeping people awake! . I recently got my hands dirty with CyberSecurity, starting from CEH. its very interesting and I am loving it!

    • @arshidshafi378
      @arshidshafi378 3 года назад +9

      @@davidbombal David I was wondering when will u start the Christmas giveaways ?????

    • @kamivibra1
      @kamivibra1 3 года назад +11

      @Kamey well, it depends on the eagerness and hunger for learning! What you really value! Now will you sacrifice a little bit your sleep in order to sleep peacefully in the future or will you always say, “will do it tomorrow!” And I am sure that “ tomorrow” will never come!

    • @nope8144
      @nope8144 2 года назад +1

      @@arshidshafi378 30th February

  • @ujwalsunar1593
    @ujwalsunar1593 3 года назад +55

    Menu:
    Overview: 0:00
    Alfa Card Setup: 2:09
    Start Wifite: 2:48
    Select WiFi network: 3:31
    Capture handshake: 4:05
    Convert cap to hccapx file: 5:20
    Copy file to hashcat: 6:31
    Hashcat: 6:50
    View GPUs: 7:08
    hashcat options: 7:52
    Start hashcat: 8:45
    Cracked: 10:31

  • @JR-ly6bx
    @JR-ly6bx 3 года назад +4

    videos are sooo thorough, they are great, especially for this type of topic where commands, tools, and difficult to understand to those that have just started

  • @MR-su9wm
    @MR-su9wm 3 года назад +11

    When I saw the title WPA2 I was shocked and very eager to learn but it was just some easy numbers which we all know is possible

  • @elbowsout6301
    @elbowsout6301 3 года назад +6

    This was a great explanation of how to use hashcat. I just tried cracking the NTLMv2 hash from my sandbox and it took 45 minutes on an RTX 2080 MaxQ. Masking really helped speed it up, I didn't want it to take forever. Although Howsecureismypassword says it would take 8 hours. If it was a real machine I would probably change that :)

    • @vikhyatverma4016
      @vikhyatverma4016 3 года назад

      What if i don't know the password Pattern Could You Explain??

    • @bobross3880
      @bobross3880 2 года назад

      MaxQ 😂

  • @Annatar0
    @Annatar0 3 года назад +61

    I'd like to see you crack different router vendors because these x-digits only passwords are kinda rare and vendors are not stupid. You are more likely to run into routers that uses a letter and number combination with upper/lower case chars, some even go as far as using a password that looks like a MAC address.

    • @nameless191
      @nameless191 2 года назад +3

      In some cases you have to do some data gathering and use that to create a custom wordlist (using crunch for example) and plug in any relevant data such as birthdate of network owner name of owner's pet and so on

    • @trentsteele1986
      @trentsteele1986 2 года назад +1

      more so in the UK

    • @alexandruilea915
      @alexandruilea915 11 месяцев назад +1

      @@nameless191 He's talking about the default passwords not the ones set up by the owner.

  • @dan-simi6
    @dan-simi6 3 года назад +17

    Try that on a password after you throw some letters into the mix LOL, but it is a good video at the end of the day, liked and subscribed.

  • @richardgnasse5776
    @richardgnasse5776 2 года назад +1

    I am brand new to DAW and soft soft - these tutorials are excellent an very helpful to get soone like up and running. Appreciate

  • @Jonas_Willems
    @Jonas_Willems 3 года назад +11

    I'd love to see you deploy attacks like these on a raspberry pi setup. Great content as always.

    • @davidbombal
      @davidbombal  3 года назад +3

      Great suggestion. This one won't work very well because we need decent GPUs

    • @DaPanda19
      @DaPanda19 3 года назад

      @@davidbombal I think I got about 600 keys/s lol

  • @PaulChabot
    @PaulChabot 3 года назад +1

    If I were to assume you are home, the information you provided in your wireless scan seems enough to get a very good idea of where that is. Of course some war driving would be involved.

  • @An.Individual
    @An.Individual 3 года назад +33

    This is a very interesting video and demonstration.
    Thanks.

  • @DeanD1990
    @DeanD1990 2 года назад +17

    Anyone looking to do this now would need to convert the .cap file to hc22000 instead of .hccapx if you receive the 'separator unmatched' error in hashcat; You can convert with:
    hcxpcapngtool -o outputname.hc22000 handshake*.cap

  • @SunTzu_0
    @SunTzu_0 3 года назад +9

    Finally a video wich i can send to my family so they will stop asking why a random device connected to them thanks David

  • @DailyMinuteFacts
    @DailyMinuteFacts 3 года назад +6

    Great content as per usual keep it up David, this vidoes are very well made!

    • @davidbombal
      @davidbombal  3 года назад

      Thank you Terry!

    • @bangmai2554
      @bangmai2554 3 года назад

      Good morning sir. Your tutorial was great and English as Second language learners may take time. Now Myanmar formerly called BURMA. The citizens are on the road and bagging the DEMOCRACY with peacefully. They are arms less and include students, workers and elderly too. But seen arms force are shooting with life arms and killing. In order to good success or winning their New Generation Kids are try to help with hacking. There are more students will do the same. Please help them sir. Hope you will understand their life in distress and need peaceful calling DEMOCRACY. Trust on you sir.

  • @filipthedev4159
    @filipthedev4159 3 года назад +5

    Great video sir! If you could make a video on cracking a password on Kali with Hashcat I think it would benefit a lot of people. Love the grind!

    • @synacksystems4122
      @synacksystems4122 3 года назад

      It is literally the same command structure as far as switches go.

  • @HKhachtag
    @HKhachtag 3 года назад +177

    add one symbol and litre and it gone to 13 years 🤭

    • @tonyfremont
      @tonyfremont 3 года назад +8

      True, but that's why it's important to get as much information as possible before cracking. AT&T 2-wire boxes have this same problem, but 10 numbers, not 8, but still trivial to brute force. Always try a dictionary attack before resorting to brute force. People make poor choices, and sometimes vendors do too. AT&T has stepped up their game a lot by increasing the length and using numbers, letters and some special characters. For some reason, all the letters are lower case and I believe there might be patterns in the format.

    • @tonyfremont
      @tonyfremont 3 года назад +4

      The saddest thing about this 8s that there has been a fix available, for years, that would prevent an outside wifi source to force a deauth on a connected device. Why haven't manufacturers implemented this fix? It wouldn't close the hole completely, but it would sure lengthen the time to perform a handshake capture. The hacker would have to wait for a device to come along and connect to the target network, instead of being able to immediately sniff who's connected and tell the router to deauth one of them.

    • @Unknown-yn4pk
      @Unknown-yn4pk 3 года назад +7

      nope, it would take less than extra 3 minutes on at least gtx1660

    • @tonyfremont
      @tonyfremont 3 года назад +13

      @@Unknown-yn4pk no, the time grows exponentially. One more printable character and it's about 75 times longer. One more on top of that and it's another 75 times longer again. Brute forcing, even with a top end card is still extremely slow. My gtx960 can do 130k hashes per second, about 20% as fast as the top end card. It took exactly two hours to brute force my home wifi even with hinting from a mask specifically constructed for my PSK, so it only guessed letters (case insensitive) where there were letters and only numbers where there were numbers. Without the hints, it would have taken years. Dictionary attacks are the only "practical" solution, unless you have knowledge of the structure of default passwords.

    • @ezzykills
      @ezzykills 3 года назад +5

      @@tonyfremont btw if I'm right my pass have a 12 character example 5hc73k90f7k3 i nead use a
      ?h?h?h?h?h?h?h?h?h?h?h?h right?

  • @nawid1687
    @nawid1687 3 года назад +8

    Finally the one that I'm looking for! Amazing video!! Id love to see an evil twin attack!

    • @davidbombal
      @davidbombal  3 года назад +1

      Thank you Nawid! All in good time :)

    • @bangmai2554
      @bangmai2554 3 года назад +1

      Good morning sir. Your tutorial was great and English as Second language learners may take time. Now Myanmar formerly called BURMA. The citizens are on the road and bagging the DEMOCRACY with peacefully. They are arms less and include students, workers and elderly too. But seen arms force are shooting with life arms and killing. In order to good success or winning their New Generation Kids are try to help with hacking. There are more students will do the same. Please help them sir. Hope you will understand their life in distress and need peaceful calling DEMOCRACY. Trust on you sir.

  • @MarkoVukovic0
    @MarkoVukovic0 3 года назад +9

    Great stuff, David! Thank for for the excellent explanation!

  • @alok30june
    @alok30june 3 года назад +1

    In this video i think you forget or leave the blur part which i seen your previous videos
    You are a awesome teacher , You explain topic very smoothly.

    • @davidbombal
      @davidbombal  3 года назад

      Thank you Alok. Not a big problem hopefully :)

    • @bangmai2554
      @bangmai2554 3 года назад

      Good morning sir. Your tutorial was great and English as Second language learners may take time. Now Myanmar formerly called BURMA. The citizens are on the road and bagging the DEMOCRACY with peacefully. They are arms less and include students, workers and elderly too. But seen arms force are shooting with life arms and killing. In order to good success or winning their New Generation Kids are try to help with hacking. There are more students will do the same. Please help them sir. Hope you will understand their life in distress and need peaceful calling DEMOCRACY. Trust on you sir.

  • @caiokleiner1275
    @caiokleiner1275 3 года назад +1

    👉🏻| First of all, this guy isn’t a teacher, he is a genius!
    .
    Congrats for video, knowledge is power, thanks for sharing an information of quality.
    🤙🏻😉👏🏻😎

  • @anuragvaste8870
    @anuragvaste8870 3 года назад +3

    Hello David, Lots of love from India. I'm following you since a long time now and I'm a big fan of yours and I watch all your videos regularly 🙂 I'm closing following your Ethical hacking tutorials and getting to learn a lot about it.
    I have a small request to make a video tutorial on "reaver" wireless testing tool. Thanks ☺️

    • @davidbombal
      @davidbombal  3 года назад

      Thank you! And great suggestion!

    • @anuragvaste8870
      @anuragvaste8870 3 года назад

      @@davidbombal thank you so much for your acknowledgement ❤️🙂 looking forward to it.

  • @triularity
    @triularity 2 года назад +8

    I imagine the default wifi password was never meant to be long term secure, but simply a step up (and maybe legal requirement in some jurisdictions) to not use the same hardcoded password across all devices. Yes, they could have done a better job. Even if all they did was an sha256 of the 8-digit number and use the first 8 characters of that hash, it would increase the search space by ~429x (bump to to 10 and it's ~109951x harder).
    Of course, if someone knew it is just the hash of an 8-digit number, they could just compute all potential passwords up front, making it a custom wordlist attack.

    • @mikebrandt5773
      @mikebrandt5773 2 года назад

      yeah im trying to bruteforce my password its says the next big bang lol but i only have a 970m graphics card in my laptop i wish i was running his cards lol

    • @andreas_cj
      @andreas_cj Год назад

      @@mikebrandt5773does it work? on that graphics card

  • @ShainAndrews
    @ShainAndrews 3 года назад +3

    Might be helpful to post the captured handshake file so individuals that do not have a capable wireless device can still work through the exercise. Good stuff David.

    • @RockG.o.d
      @RockG.o.d 3 года назад

      a good cheap laptop to get is a dell latitude 7440 or above. others will probably work too but the network card in the e7440 and also the e7470 both support monitor mode, plus the laptops are cheap, less than 200 dollars.

    • @WatchTheLadyOfHeaven313
      @WatchTheLadyOfHeaven313 3 года назад

      @@RockG.o.d so with these dell laptops you don't need that Alpha wireless adapter?

    • @RockG.o.d
      @RockG.o.d 3 года назад

      @@WatchTheLadyOfHeaven313 that’s right.

  • @bskarpa
    @bskarpa 8 месяцев назад +1

    Thank you for these videos. I’m in cybersecurity and one of my classes is ethical hacking and I’ve learned more watching your videos than I have in my classes. I finally bought a pc and installed kali on it and been using it to check my network.

  • @realhomy
    @realhomy 3 года назад +54

    Keep grinding we need more of these amazing videos

  • @DV7Dave
    @DV7Dave 3 года назад

    If you think this is bad, the Netcomm modem/routers that we shipped from our ISP was a1b2c3d4e5. I've used it a number of times throughout my city. I've got a Google Map list of all the places I know I can rely on for WiFi if I'm in a pinch. I've never even considered using software like this!

  • @onemoreword8690
    @onemoreword8690 2 года назад +6

    Hi David, could you show how to use hashcat with multiple GPUs. For example, if there is an unused mining rig, how to organize remote access and launch hashcat using the power of all its video cards. Thank you for the informative video!

  • @Mac-i7
    @Mac-i7 2 года назад +1

    Excellent presentation! Please go into detail in future videos.

  • @rodrigofloresf.7259
    @rodrigofloresf.7259 3 года назад +6

    Superb content as always David!

  • @vukanigcabashe8994
    @vukanigcabashe8994 2 года назад +1

    I love your material, still aspiring to be at least half the skill you are. Thank you

  • @raaziqparkar
    @raaziqparkar 3 года назад +8

    I tried hacking my own WiFi but realised I can't watch the video at the same time😂😂😂😂

  • @MustafaGains
    @MustafaGains 2 года назад

    Thx god to let me find ur amazing perfect youtube channel. thx my Teacher . Am an IT student this is last year for me and am gonna graduate and this year we study only cyber security so u helped me a lot as ethical hacker .

  • @Mewmew-y4m
    @Mewmew-y4m 3 года назад +58

    *"This is how to make a BOMB"*
    Disclaimer:This is for educational purposes only...

    • @abdkarimjusoh8578
      @abdkarimjusoh8578 3 года назад +1

      🤣🤣🤣

    • @Zaynersyy
      @Zaynersyy 3 года назад +1

      Uhh yeah? I mean, I watch a lot of how to make explosive videos. It's indeed just for educational purposes only. I want to learn the chemistry. I also just find it fascinating. I blow it up on my garden. It's just so.. satisfying when something you make is working. I also usually tweak the formula a bit to my liking. I would never blow someone else's garden or house lol.

    • @bedbreaker5675
      @bedbreaker5675 3 года назад

      @@Zaynersyy I don't think you get the joke here lol
      What he is saying is that the uu literally teaches us how to use a software that usually used for malicious purposes and than says it's for educational purposes only

    • @bekatsertsvadze6396
      @bekatsertsvadze6396 3 года назад

      if you want to be safe with your internet you need to know how it works to crack your password this is ethical hacking and if you use it against someone you'll go to jail

  • @nelsontovars
    @nelsontovars 3 года назад +2

    I learnt so much!
    I cracked my own TP-link as well. Thank you!
    Can you someday may one video using Cain and Abel tool for Windows? (maybe)?

  • @cosminduduc3016
    @cosminduduc3016 2 года назад +8

    Hello David! Thanks for your video! Did you try the same with hashcat after v6 when they've replaced 2500 with 22000? I am struggling on that. All the best and thank you for everything you are doing for the InfoSec community!

    • @codewithraiju1424
      @codewithraiju1424 2 года назад

      Hey.. Are you facing some kind of error?

    • @tiloalo
      @tiloalo 2 года назад

      I did use it with 22000 successfully

    • @lachlank
      @lachlank Год назад +1

      ​@@tiloalodid u do it the exact same in the video but with 22000

  • @darksoulomkar9499
    @darksoulomkar9499 2 месяца назад

    This was amazing, I've got rtx 4050 laptop GPU. It should take less time. I will give it a try

  • @dr--a
    @dr--a 3 года назад +4

    Thank You So Much for a very easy to understand instructions
    Mad Respect 🙏🏼

  • @subhrothetechnoguru
    @subhrothetechnoguru 3 года назад

    Nice video sir...some people make 10 minute videos and I get bored to watch them but even if you make a 20 minute video...I don't feel bored at all......

  • @chirayuzambare2930
    @chirayuzambare2930 3 года назад +2

    David just want to say loved your videos and they are pretty simple and easy to understand as well
    i wanted to make a request if you could make a video on evil twin attack as well that would be great

  • @sudharshanv9443
    @sudharshanv9443 3 года назад +13

    Great teacher...❤️

  • @VampirusX
    @VampirusX 3 года назад

    Impressive!
    I am surrounded by WPS networks 🤩
    Therefore only 4 digits are necessary.

  • @TheExsi
    @TheExsi 3 года назад +7

    David thanks for all your hard work i mean it mate. The quality is on another level.
    1) If possible on your next video about hashcat could you explain witch modern GPU`s works better . Is amd still a no ?
    2) My problem when i was trying to hash my password ( honestly it was mine) is that i use most of the possible letters and symbols combos(paranoid much...too much hacking videos) and i couldn`t for the life of me figure out what was the right symbols to put behind the ''?''. I want the ''All'' symbol !
    Plus a question : in mask attack is there a way to exclude passwords that has sequentially numbers letters and symbols ? Like 111111555 or ffffff8888 ?
    I believe that this would significantly cut down the time. ( currently after next big bang).
    Doing research found that crunch can generate a wordlist provided you configured right but the amount of terabytes its too damn high and not a valid option for me.
    Going down the rabbit hole i found that there is a way to "pipe" this process directly to hashcat. I haven't tried this yet cause of luck of know how and i probably wont cause also i don't have a spare pc if it goes bam!.
    Sorry for the rant.

    •  2 года назад

      haha there is a way... use random number and each time you increase the random seed. for sure the number sequence will not be repeated

  • @bambarhan
    @bambarhan 3 года назад

    Thanks for sharing and teaching. This video was nice and clear. Voice was great.

  • @SavaKecman
    @SavaKecman 3 года назад +12

    I needed this i like the idea to crack it in windows..thnks!!!

  • @Nevoxy97
    @Nevoxy97 3 года назад

    progression hits 69% *cracked* N I C E

  • @vyasG
    @vyasG 3 года назад +3

    Thank you. Amazing Video. It emphasises why we should have a strong password. Especially in Wireless.
    Is it really this simple to capture wireless handshakes?

    • @davidbombal
      @davidbombal  3 года назад +1

      Agreed. Definitely need to use strong passwords. It is very simple if you are in range and clients are connected.

    • @bangmai2554
      @bangmai2554 3 года назад

      Good morning sir. Your tutorial was great and English as Second language learners may take time. Now Myanmar formerly called BURMA. The citizens are on the road and bagging the DEMOCRACY with peacefully. They are arms less and include students, workers and elderly too. But seen arms force are shooting with life arms and killing. In order to good success or winning their New Generation Kids are try to help with hacking. There are more students will do the same. Please help them sir. Hope you will understand their life in distress and need peaceful calling DEMOCRACY. Trust on you sir.

    • @elbowsout6301
      @elbowsout6301 3 года назад +1

      It's so easy! Just need to have the right tools. You can send out deauth packets to kick users off their own network then when they reconnect capture the handshake.

  • @siobhanvidaashmole9009
    @siobhanvidaashmole9009 2 года назад

    David did not bumble.... Great content!
    I'm wondering if hashcat generates detailed logs, I'm researching a new protocol that requires seeing how the handshake deals with incorrect keys.

  • @joshuasiron5560
    @joshuasiron5560 Год назад +3

    They recently changed -m 2500 to -m 22000 and when I try to run it I’m getting separator unmatched errors with no results. Does anyone know how I can fix this?

  • @scottforbes0
    @scottforbes0 Год назад +2

    In my perspective, this 8-digit key has been designed to offer a moderately secure means of authentication with the wifi router, thereby introducing an additional layer of security as you configure your own key.

    • @alexandruilea915
      @alexandruilea915 11 месяцев назад

      True but a lot of people keep the default password

  • @MidiNanakul
    @MidiNanakul 3 года назад +27

    Hey David, I'm following these instructions, but I keep getting an error saying that "The plugin 2500 is deprecated and was replaced with plugin 22000." When I switch my -m to 22000 instead of 2500, I get a bunch of separator errors. Do you or anyone else know how to fix this?

    • @kemerios1
      @kemerios1 2 года назад +2

      Same with me found anything?

    • @shalinina477
      @shalinina477 2 года назад

      Use earlier version of hashcat.... Like 4.0.1 or something like that.... And use -m 2500 in it..

    • @laurentdelante440
      @laurentdelante440 2 года назад +1

      You can use the same version as David's ie 6.1.1 and it will work ok. With the latest 6.2.5, it keeps throwing errors indeed.

    • @ijustsneezed6484
      @ijustsneezed6484 2 года назад +5

      If you're using kali linux try -m 2500 and put --deprecated-check-disable at the end and see if that works

    • @DeanD1990
      @DeanD1990 2 года назад +9

      Okay I'm a little late to the mark here so I guess you have resolved this yourself but for anyone that is struggling still, You need to convert the .cap file to .hc22000 not .hccapx because hashcat no longer supports that format and there is more to a hash file than meets the eye so I would say disabling checks most probably wouldn't work.
      Use hcxpcapngtool (which I imagine you already have installed since you're watching this) and run $ hcxpcapngtool -o outputfilename.hc22000 handshake*.cap (what ever your input file is called) and yes there are no args for the input and this took me about 15 minutes to figure out... shamefully

  • @kim-nt5yk
    @kim-nt5yk Год назад +1

    Teacher, its so interesting on doing this as your guide thank u

  • @osamielec
    @osamielec 3 года назад +7

    why didn't you mention the problem "No hashes loaded"?
    Would do well to

    • @AZZAOL
      @AZZAOL 2 года назад +1

      you found solution?

  • @roccoranallo4027
    @roccoranallo4027 3 года назад +1

    Dude you the bomb so glad I found your channe

  • @ujithadharshana7397
    @ujithadharshana7397 3 года назад +3

    Good Lesson Sir 🔥🔥🔥

  • @rgk1579
    @rgk1579 3 года назад +1

    Besides Cracking tools and dictionary attacks , I suggest you try some phishing attacks with some powerful tools like airgeddon , fluxion , wifi-phisher . They are amazing tools with everything included . With these you will no longer have to wait if you phish your target successfully
    Thanks

  • @Jimfowler82
    @Jimfowler82 3 года назад +6

    May I ask why you switch to windows to use hashcat?

    • @silistar2646
      @silistar2646 8 месяцев назад

      I'm assuming nvidia drivers are probably better on windows but I have no idea

  • @NeelNarayan
    @NeelNarayan 3 года назад +1

    Most of the time people use their mobile phone numbers as their Wifi Password ! Now you know how to begin :)

    • @davidbombal
      @davidbombal  3 года назад

      lol... how many digits in your telephone number?

    • @NeelNarayan
      @NeelNarayan 3 года назад

      @@davidbombal 10

    • @davidbombal
      @davidbombal  3 года назад

      @@NeelNarayan I'll create a video about that. Want to share your number :) Just kidding. I'll have to pick a good USA telephone number example.

    • @NeelNarayan
      @NeelNarayan 3 года назад +2

      @@davidbombal Haha.. That would be great but i use Alpha-Galatic complex passwords for my WPA-Infinity Router
      :P , (just kidding, made all that up) . But in reality people have tough time remembering their passwords so they just use their phone numbers. Also, if you could make a video on recent SolarFlare & Solar winds attack, that would be great !

  • @michaelengin
    @michaelengin 3 года назад +3

    Just a question: How to guess How many characters we need to find ? I mean usualy we haven't any clue so how many " ? " to put in ?

    • @moonshinestv1084
      @moonshinestv1084 3 года назад +2

      He knew the wifi password and include it in the wordlist already lol thats y people say brute force sucks

    • @bluegizmo1983
      @bluegizmo1983 3 года назад

      @@moonshinestv1084 No he didn't... He used what's called an 8 digit mask. It tries every number (0-9) for one to eight digits. WPA requires a minimum of 8 characters, and if someone is using all digits it will most likely be 8, 9 or 10 digits long (because people don't remember long strings of numbers easily so they will either use a minimum length string or birthday which is 8 characters, a SSN which is 9, or a phone number which is 10)

    • @aksheetv4732
      @aksheetv4732 3 года назад

      u can use crunch to generate wordlists with all letters and specify how many characters
      crunch
      u can search the usage in google...i dont remeber the format

  • @TTS2020
    @TTS2020 3 года назад

    Those WiFi adapters are $70 now! You made the price go up lol

  • @typ0_cratz
    @typ0_cratz 3 года назад +9

    Hello David I have been looking around but I don't seem to find an answer, following this tutorial on the current version of hashcat will say that -m 2500 is depracated and should use 22000 instead, But when I do 22000 with the file wap2.hccpax that we created in this tutorial it comes with separator errors. Would you have an idea of how to get around this? Thanks in advance :)

  • @dw1508
    @dw1508 3 года назад

    Fantastic now I don't need to pay for internet any more. Great Video

  • @blackdrake_371
    @blackdrake_371 3 года назад +5

    what if I don't know the password lenght?

    • @pepsi-straw-dog
      @pepsi-straw-dog 3 года назад +2

      You can do barely nothing. At most you can try searching for some default passwords examples of the router you captured the handshake from and then see how does that router generates the password and hopefully you will find some patterns.
      Keep in mind that WPA, WPA2 and i think WPA3 passwords can NOT be shorter than 8 characters.
      A part from 8 characters, other most common password lenghts are 10, 12, 14 and 16 and 20. Those are impossible to crack with a normal pc as you would need a lot of them.

  • @Inspire.me_Now167
    @Inspire.me_Now167 3 года назад

    wow...information knowledge for who is bigginer in this field

  • @bhuwanjain2957
    @bhuwanjain2957 3 года назад +2

    That's a great video,please make more videos
    Finally found some quality content
    💯💯💯💯

  • @wisteela
    @wisteela 3 года назад

    That is incredible.
    It's a good job I never use default passwords.

  • @yanz7334
    @yanz7334 3 года назад

    Thumb up for the knowledge, I changed my password immediately after the video 😂

  • @belucci183
    @belucci183 3 года назад

    On my First try, the entire system shut down. Second try with all fan blasting, Success!! It took 3 minutes 4 seconds to crack. & yes it was a TP-link. Thanks

  • @Jakefelooshort
    @Jakefelooshort 3 года назад

    We trust you received the usual lecture form the local system Administrator. It usually boils down to those things = errors show

  • @yaserbasaad7984
    @yaserbasaad7984 3 года назад

    Thanks a lot , Yes pls we need more videos using hashcat.

  • @stebberg
    @stebberg 3 года назад

    very cool! :) I wish there were larger wordslists out there to download, perhaps per router model

  • @yusufkocaboga3868
    @yusufkocaboga3868 3 года назад

    @David Bombal Thanks for this video.

  • @Andy.N-_-
    @Andy.N-_- 3 года назад

    Excellent thank you, Would be good to see a Linux (kali) version using Hashcat

    • @atle6913
      @atle6913 3 года назад

      Hey dude, i got a message when i run the command: hashcat.exe -I , it says "Unsupported AMD HIP runtime version '0.0.3240' detected! Falling back to OpenCL..." . How can i fix this problem? Need some advice bro. Thanks a lot!!

  • @Guillie641
    @Guillie641 3 года назад

    LOVE your videos Great teacher securing my / SOHO / AS YOU SPEAK

  • @hlbgghj
    @hlbgghj 3 года назад

    sir i love you i don't have linux but i am gonna download it and soon gonna practicing all these kinda stuff cause its meant for me to learn it in 2021 and i hope you keep uploading all these kinda i am really excited and i always wanted to have something like that and that is hacking skill

  • @rishabhtomar7071
    @rishabhtomar7071 3 года назад

    sir rather than using wifite to automate capturing of handshake, you should use manual method by using aircrack-ng suite. Love your videos

    • @bluegizmo1983
      @bluegizmo1983 3 года назад

      ? .... Why?

    • @canomartinez6628
      @canomartinez6628 3 года назад

      if your pro help me man

    • @rishabhtomar7071
      @rishabhtomar7071 3 года назад

      There are various tutorials that can help you to capture handshake manually using airodump-ng and aireplay-ng to perform a deauth attack.

  • @PK-lq7sg
    @PK-lq7sg 3 года назад +2

    Probably this is what my mother experiencing when I explaining her how to update a driver on her laptop... :D Poor her! I will do it better after this thank you! :D even if it was not the purpose of your video!

    • @bangmai2554
      @bangmai2554 3 года назад

      Good morning sir. Your tutorial was great and English as Second language learners may take time. Now Myanmar formerly called BURMA. The citizens are on the road and bagging the DEMOCRACY with peacefully. They are arms less and include students, workers and elderly too. But seen arms force are shooting with life arms and killing. In order to good success or winning their New Generation Kids are try to help with hacking. There are more students will do the same. Please help them sir. Hope you will understand their life in distress and need peaceful calling DEMOCRACY. Trust on you sir.

  • @DrDoctopus
    @DrDoctopus 3 года назад

    Legend has it if you do this with an RTX3090 it will finish in the past

  • @kabandajamir9844
    @kabandajamir9844 3 года назад +1

    The world's best teacher thanks

  • @bnk28zfp
    @bnk28zfp 3 года назад +2

    Yes please do more on hashcat!!

  • @hubert155
    @hubert155 3 года назад

    100 million possibilities - variations with répétions , since ?d?d... -> 10x10x10...x10 -> 10^8

  • @MrInvencibleBro
    @MrInvencibleBro 3 года назад

    It works fo default Password only.. it was amazing while cracking thanks for this video.,

  • @Santriell
    @Santriell 2 года назад

    Used a GTX6660S 6 G/ddr6 -> 6 mins for a bruteforce of 12 randomized characters :) (around 10 million p/s) :)

  • @netweirdo2009
    @netweirdo2009 2 месяца назад

    It took a second with no extra step man thanks a lot a hacking fun God bless ya man

  • @vikxzenshorts
    @vikxzenshorts 3 года назад +1

    What 12 year old timmys look up after getting roasted online

  • @kevtheskin
    @kevtheskin 3 года назад

    Morning David, Cheers for the video. Your cracking time would have been quicker if you had cleaned the cap. HS had to crack 4 of the same wpa captures ? . Thanks again Kev

    • @davidbombal
      @davidbombal  3 года назад

      No. I have tested this in the past. Same results.

    • @kevtheskin
      @kevtheskin 3 года назад

      @@davidbombalOk possibly bad cap at my side. Really enjoy your tutorials. May I ask where your accent is from. You sound like someone who would enjoy Biltong. Cheers Kev

  • @Zim5.0
    @Zim5.0 11 месяцев назад

    Thank you so much for this educational video 😊

    • @bayuaji9846
      @bayuaji9846 11 месяцев назад

      have you tried it successfully??

  • @LuisRibeirodobest
    @LuisRibeirodobest 3 года назад +1

    Hi amazing videos you make... Question can we set the time of discovering clients at WPA hacking?

  • @Anatol_SG
    @Anatol_SG 3 года назад

    Well oh well. 8 years, 182 days for me.
    I'd rather mine bitcoins ))
    Jokes aside, great video! As always. David's videos are the only videos on RUclips I'm watching only if I have my notepad ready to take notes

  • @enigmatimson4565
    @enigmatimson4565 3 года назад +1

    love you and your content so much :D

  • @kithano
    @kithano 3 года назад +1

    If you are having the problem that you cannot use the method 2500 because it got deprecated, like me, just try downloading the version 6.1.1 from the website and allow it to work from your antivirus

  • @alexmenchenpacheco3374
    @alexmenchenpacheco3374 Год назад +1

    Modern routers has a default Key of 8-10 digts alphanumeric, also uppercase letters, it is 49 probs per digit, 49^8 are literally imposible to crack, unless you live 1294132959351951 years

  • @timsik08
    @timsik08 3 года назад +2

    just a quick note, /usr is pronounced as U-S-R, it stands for unix system resources. just saying this because many beginners will think that the /usr directory has something to do with the user.

    • @davidbombal
      @davidbombal  3 года назад +1

      Is it a router or a router? Tomato or tomato? Is it Linux or Linux? Etc or etc? Seems others also disagree with you about usr: www.linode.com/community/questions/3714/how-do-you-pronounce-usr

  • @hamishhardy2438
    @hamishhardy2438 3 года назад +2

    Would be nice to see Hashcat bruteforcing Windows 10 SAM file to decrypt Windows password

  • @ultrainstinct6715
    @ultrainstinct6715 3 года назад

    Thank you so much mister David. Very cool tutorial.

  • @lukebeardsley1040
    @lukebeardsley1040 3 года назад

    love the vidios , just got my wifi adaptor

  • @s.mansoorkazemi2631
    @s.mansoorkazemi2631 3 года назад +1

    Thanks for the amazing video.
    A quick question after finishing your CCNA class on Udemey shall we need to buy and practice the dumps for the exam ?

    • @8Jallin
      @8Jallin 3 года назад +1

      Yes it is recommended, make sure to tell your exam instructor about this and you might get extra 10 mins depending on where you live.
      Good luck.

    • @s.mansoorkazemi2631
      @s.mansoorkazemi2631 3 года назад

      @@8Jallin thanks for the reply, from where can I get the verified dumps

  • @vikhyatverma4016
    @vikhyatverma4016 3 года назад

    What i understood from these videos is That..You can only crack passwords of your own network because you Know the Pattern..
    If you don't know the Pattern Dictionary Attack is the only Solution to it...And it might work Might Not depending upon how naive wifi owner is.

    • @DvirMuja
      @DvirMuja 2 года назад

      He literally did a brute force attack in this video?

  • @MatiCpluplus
    @MatiCpluplus 3 года назад +2

    It took me only 2 min xD (same GPU)
    Thanks!