![]() So, I am at a standstill on that part of things, until I get a decent grasp of what I need to do to get Hashcat to run on my setup without throwing an error. I don't know, but I think I need an OpenCL driver or something (the OS is Kali 2017.1 rolling release, and the machine is a HP Pavilion dv7 with a Centrino Wireless-N 1000 card). However, I ran an error with Hashcat3.3 and the hardware/software setup that I have (* Device #1: Not a native Intel OpenCL runtime, expect massive speed loss). ![]() ![]() However, I'm not aware of Aircrack-ng supporting rule based attacks, so I figured I'd get a bit familiar with Hashcat3.3 so that I can use some mangling rules along with just 2 or 3 decent wordlists (like rockyou.txt, etc.) to see what they'll accomplish. So I know that the program works, but it was also cheating, because I rigged the wordlist with the already known password. I've got the handshakes, and I've cracked my own BSSID with Aircrack-ng, using the "Rockyou.txt" wordlist. The problem is that I cannot think of any other way to match the detectable SSIDs or BSSIDs to their AP owners, and I need to do exactly that (I'm pretty sure). And, I almost know the majority of people who live around me. Okay, there's about a dozen AP's near enough to me that I can walk to each AP owner's mailbox and see the street address. A longer rundown of the situation might be. The title pretty much sums up the gist of it.
0 Comments
Leave a Reply. |