![]() ![]() However, I ran an error with Hashcat3.3 and the hardware/software setup that I have (* Device #1: Not a native Intel OpenCL runtime, expect massive speed loss). However, I'm not aware of Aircrack-ng supporting rule based attacks, so I figured I'd get a bit familiar with Hashcat3.3 so that I can use some mangling rules along with just 2 or 3 decent wordlists (like rockyou.txt, etc.) to see what they'll accomplish. So I know that the program works, but it was also cheating, because I rigged the wordlist with the already known password. I've got the handshakes, and I've cracked my own BSSID with Aircrack-ng, using the "Rockyou.txt" wordlist. The problem is that I cannot think of any other way to match the detectable SSIDs or BSSIDs to their AP owners, and I need to do exactly that (I'm pretty sure). And, I almost know the majority of people who live around me. Okay, there's about a dozen AP's near enough to me that I can walk to each AP owner's mailbox and see the street address. ![]() A longer rundown of the situation might be. The title pretty much sums up the gist of it. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |