16 secs to break it! 😱 70% of real world WiFi networks owned!

Big thanks to Cisco Meraki for sponsoring this video! Learn how to secure hybrid networks so you can stop these kinds of attacks: https://davidbombal.wiki/meraki

Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Only use the tools demonstrated in this video on networks you have permission to attack.

// MENU //
\n00:00 ▶️ Intro
\n02:17 ▶️ Real word example
\n02:58 ▶️ Hashcat file format
\n03:28 ▶️ Handshake capture (old mode) 10 digits
\n03:57 ▶️ GPU setup
\n04:12 ▶️ Handshake capture (old mode) 10 digits (cont\’d)
\n06:21 ▶️ Handshake capture (new mode) 8 digits
\n07:57 ▶️ Handshake capture (old mode) 8 digits
\n09:07 ▶️ Incrementing digits
\n11:55 ▶️ Built-in charsets
\n12:22 ▶️ Cracking alphanumerical passwords
\n18:42 ▶️ Using wordlists
\n19:00 ▶️ Conclusion

\n \n

// Previous Videos //
\nWiFi WPA/WPA2 vs hashcat and hcxdumptool: https://youtu.be/Usw0IlGbkC4
\nKali Wifi Adapters: https://youtu.be/5MOsY3VNLK8
\nOld method using airmon-ng: https://youtu.be/WfYxrLaqlN8
\nOld method using GPUs: https://youtu.be/J8A8rKFZW-M

// COMMANDS //
\nCheck GPU:
\nhashcat.exe -I

10 digits (Old Method):
\nhashcat.exe -m 2500 -a 3 10digit.hccapx ?d?d?d?d?d?d?d?d?d?d

Increment WPA2 digits (Old Method):
\nhashcat.exe -m 2500 -a 3 10digit.hccapx –increment –increment-min 8 –increment-max 20 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d

8 digits (New Method):
\nhashcat.exe -m 22000 8-digit-wpa2.hc22000 -a 3 ?d?d?d?d?d?d?d?d

10 digits (New Method):
\nhashcat.exe -m 22000 10-digit-wpa2.hc22000 -a 3 ?d?d?d?d?d?d?d?d?d?d

10 digits and alpha (New Method):
\nhashcat.exe -m 22000 10-digit-letters-wpa2.hc22000 -1 ?d?l?u -a 3 ?1?1?1?1?1?1?1?1?1?1

Increment digits (New Method):
\nhashcat.exe -m 22000 hash.hc22000 -a 3 –increment –increment-min 8 –increment-max 18 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d

Increment digits and alpha (New Method):
\nhashcat.exe -m 22000 10-digit-letters-wpa2.hc22000 -1 ?d?l?u -a 3 –increment –increment-min 8 –increment-max 12 ?1?1?1?1?1?1?1?1?1?1?1?1

\n

// Previous Videos //
\nWiFi WPA/WPA2 vs hashcat and hcxdumptool: https://youtu.be/Usw0IlGbkC4
\nKali Wifi Adapters: https://youtu.be/5MOsY3VNLK8
\nOld method using airmon-ng: https://youtu.be/WfYxrLaqlN8
\nOld method using GPUs: https://youtu.be/J8A8rKFZW-M

// SOCIAL //

\n

================
\nConnect with me:
\n================
\nDiscord: http://discord.davidbombal.com
\nTwitter: https://www.twitter.com/davidbombal
\nInstagram: https://www.instagram.com/davidbombal
\nLinkedIn: https://www.linkedin.com/in/davidbombal
\nFacebook: https://www.facebook.com/davidbombal.co
\nTikTok: http://tiktok.com/@davidbombal
\nYouTube: https://www.youtube.com/davidbombal

================
\nSupport me:
\n================
\nJoin thisisIT: https://bit.ly/thisisitccna
\nOr, buy my CCNA course and support me:
\nDavidBombal.com: CCNA ($10): http://bit.ly/yt999ccna
\nUdemy CCNA Course: https://bit.ly/ccnafor10dollars
\nGNS3 CCNA Course: CCNA ($10): https://bit.ly/gns3ccna10

\n

// MY STUFF //
\nMonitor: https://amzn.to/3yyF74Y
\nMore stuff: https://www.amazon.com/shop/davidbombal

// SPONSORS //
\nInterested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com

wifi
\ngpu
\nkali linux
\nkali wifi
\nkali
\nalfa
\nalfa network
\nalfa network adapter
\nwifi password
\nwpa
\nwpa2
\nhashcat
\nlinux

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

#wifi #wpa2 #hashcat

subscribe
  • David Bombal