16 secs to break it! 😱 70% of real world WiFi networks owned!

David Bombal
David Bombal
1.6 میلیون بار بازدید - 3 سال پیش - Big thanks to Cisco Meraki
Big thanks to Cisco Meraki for sponsoring this video! Learn how to secure hybrid networks so you can stop these kinds of attacks: https://davidbombal.wiki/meraki

Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Only use the tools demonstrated in this video on networks you have permission to attack.

// MENU //
00:00  ▶️ Intro
02:17 ▶️ Real word example
02:58 ▶️  Hashcat file format
03:28 ▶️  Handshake capture (old mode) 10 digits
03:57 ▶️  GPU setup
04:12 ▶️  Handshake capture (old mode) 10 digits (cont'd)        
06:21 ▶️  Handshake capture (new mode) 8 digits
07:57 ▶️  Handshake capture (old mode) 8 digits
09:07 ▶️  Incrementing digits
11:55 ▶️  Built-in charsets
12:22 ▶️  Cracking alphanumerical passwords
18:42 ▶️  Using wordlists
19:00 ▶️  Conclusion

// Previous Videos //
WiFi WPA/WPA2 vs hashcat and hcxdumptool: WiFi WPA/WPA2 vs hashcat and hcxdumptool
Kali Wifi Adapters: Best WiFi Hacking Adapters in 2021 (K...
Old method using airmon-ng: Cracking WiFi WPA2 Handshake
Old method using GPUs: Brute force WiFi WPA2

// COMMANDS //
Check GPU:
hashcat.exe -I

10 digits (Old Method):
hashcat.exe -m 2500 -a 3 10digit.hccapx ?d?d?d?d?d?d?d?d?d?d

Increment WPA2 digits (Old Method):
hashcat.exe -m 2500 -a 3 10digit.hccapx --increment --increment-min 8 --increment-max 20 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d

8 digits (New Method):
hashcat.exe -m 22000 8-digit-wpa2.hc22000 -a 3 ?d?d?d?d?d?d?d?d

10 digits (New Method):
hashcat.exe -m 22000 10-digit-wpa2.hc22000 -a 3 ?d?d?d?d?d?d?d?d?d?d

10 digits and alpha (New Method):
hashcat.exe -m 22000 10-digit-letters-wpa2.hc22000 -1 ?d?l?u -a 3 ?1?1?1?1?1?1?1?1?1?1

Increment digits (New Method):
hashcat.exe -m 22000 hash.hc22000 -a 3 --increment --increment-min 8 --increment-max 18 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d

Increment digits and alpha (New Method):
hashcat.exe -m 22000 10-digit-letters-wpa2.hc22000 -1 ?d?l?u -a 3 --increment --increment-min 8 --increment-max 12 ?1?1?1?1?1?1?1?1?1?1?1?1


// Previous Videos //
WiFi WPA/WPA2 vs hashcat and hcxdumptool: WiFi WPA/WPA2 vs hashcat and hcxdumptool
Kali Wifi Adapters: Best WiFi Hacking Adapters in 2021 (K...
Old method using airmon-ng: Cracking WiFi WPA2 Handshake
Old method using GPUs: Brute force WiFi WPA2

// SOCIAL //
Discord: Discord: discord
Twitter: Twitter: davidbombal
Instagram: Instagram: davidbombal
LinkedIn: LinkedIn: davidbombal
Facebook: Facebook: davidbombal.co
TikTok: TikTok: davidbombal
YouTube: davidbombal

// MY STUFF //
Monitor: https://amzn.to/3yyF74Y
More stuff: https://www.amazon.com/shop/davidbombal

// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: [email protected]

wifi
gpu
kali linux
kali wifi
kali
alfa
alfa network
alfa network adapter
wifi password
wpa
wpa2
hashcat
linux

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

#wifi #wpa2 #hashcat
3 سال پیش در تاریخ 1400/12/06 منتشر شده است.
1,633,751 بـار بازدید شده
... بیشتر