Can anyone help me to decrypt wpa2 handshake : hacking | Torhoo darknet markets
I've already captured the handshake of a wpa2 protected wifi and converted it .hc22000 file and here it is:
WPA*02*278457bf686937057eb0e6ac17e67eb8*c8eaf8284a19*1e3ebb462329*49646f6f6d2034475f3834413139*94c965eb10e2ac6c63d5b041dca125276ae7432dd0547bc08932cde6c619bb39*0103007502010a0000000000000000000007da28058428c667dfc31b7644596f18fc27ee818ec3c59aecec2bdbb7e87181000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001630140100000fac040100000fac040100000fac020000*c2
I'm new in this domain tbh so if anyone could help (already tried rouckyou.txt)
What i know is that you need to use another router instead of yours
In theory, law enforcement could break handshake, recover WiFi password and collaborate with internet providers to identify customers with specific WiFi password.
Exist sites like WIGGLE that help locate WiFi using unique SSID. However, extracting WiFi SSID or BSSID from hash seems problematic.
-
1. run and make note of the "mode number" for WPA2 - 2. put the hash in a file - 3. Get a wordlist for WPA (google) - 4. run
-
5. Let it run for a while. Depending on your hardware and length of wordlist it might take a while. Pickup a GTX 970 for and let it run overnight.
edit01: and he was able to run rockyou on it already