[ASK] Wpa Handshake

by Oncom - 04-06-2016 at 02:12 AM
Network Security Analyst
Administrators
Posts:
18
Joined:
Mar 2016
Likes:
0
Reputation:
0
2 Year Of Member
#11
Posted: 04-14-2016, 10:06 AM
Kunjungi ini mas :D
http://backboxindonesia.or.id/thread-86.html
={EXPLORE|EXPLOIT|HAVE FUN!}=
Reply
Find Posts
Junior Member
Posts:
33
Joined:
Mar 2016
Likes:
0
Reputation:
0
2 Year Of Member
#12
Posted: 04-14-2016, 09:02 PM
iyaa pake wifite aja bro. .

[+] 1 target selected.

[0:00:00] initializing WPS PIN attack on (F6:DC:F9:FE:65:82)
^C0:00:29] WPS attack, 0/0 success/ttl,
(^C) WPS brute-force attack interrupted
[0:08:20] starting wpa handshake capture on ""
[0:08:16] new client found: C01885:761047
[0:08:00] listening for handshake...
[0:00:20] handshake captured! saved as "hs/_F6-DC-F9-FE-65-82.cap"

[+] 2 attacks completed:

[+] 0/2 WPA attacks succeeded
(F6:DC:F9:FE:65:82) handshake captured
saved as hs/_F6-DC-F9-FE-65-82.cap

[+] starting WPA cracker on 1 handshake
[!] no WPA dictionary found! use -dict <file> command-line argument

[+] disabling monitor mode on mon0... done
[+] quitting
Reply
Find Posts
Administrator
Administrators
Posts:
35
Joined:
Mar 2016
Likes:
0
Reputation:
1
2 Year Of Member
#13
OP
Posted: 04-15-2016, 04:05 PM
(04-14-2016, 10:06 AM)hightech Wrote: Kunjungi ini mas :D
http://backboxindonesia.or.id/thread-86.html

oke siap meluncur mas ..
Harta, Tahta, Pevita
Reply
Find Posts
Administrator
Administrators
Posts:
35
Joined:
Mar 2016
Likes:
0
Reputation:
1
2 Year Of Member
#14
OP
Posted: 04-15-2016, 04:08 PM
(04-14-2016, 09:02 PM)teh Wrote: iyaa pake wifite aja bro. .

[+] 1 target selected.

[0:00:00] initializing WPS PIN attack on  (F6:DC:F9:FE:65:82)
^C0:00:29] WPS attack, 0/0 success/ttl,
(^C) WPS brute-force attack interrupted
[0:08:20] starting wpa handshake capture on ""
[0:08:16] new client found: C01885:761047                        
[0:08:00] listening for handshake...                    
[0:00:20] handshake captured! saved as "hs/_F6-DC-F9-FE-65-82.cap"

[+] 2 attacks completed:

[+] 0/2 WPA attacks succeeded
        (F6:DC:F9:FE:65:82) handshake captured
       saved as hs/_F6-DC-F9-FE-65-82.cap
       
[+] starting WPA cracker on 1 handshake
[!] no WPA dictionary found! use -dict <file> command-line argument

[+] disabling monitor mode on mon0... done
[+] quitting

wih mantep bro langsung dapet wpa handshakenya tuh jadi ingin coba :P
Harta, Tahta, Pevita
Reply
Find Posts
Register an account or login to reply
Create an account
Create a free account today and start posting right away. It only takes a few seconds.
Login
Log into an existing account.
1 Guest(s)