Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sun, 1 Dec 2019 17:47:55 +0100
From: Johny Krekan <krekan@...nykrekan.com>
To: john-users@...ts.openwall.com
Subject: Steps to perform good audit of WPA PSK Hashes

Hello, From the posts I have read here troughout the time it is clean 
that there is lot of experience here so I would like to ask for your 
ideas about test:
During my tests, I was auditing 100 WPA PSK hashes, My success rate was 
28% (28 cracked). The steps that were taken:
1. Complex Slovak wordlist with John The ripper single rules (about 500 
words from each word were generated) - 6 passwords found
2. All 8 digit numbers were tested (11 passwords found)
3. Large wordlist weakpass+2wifi with no additional mangling: 7 
passwords found
4. Passwords generated from ssid: 1 found
5. small english worrdlist with single rules: 3 found
My question: What other attack would you use to increase the success 
rate even further?
Thanx for ideas
Johny Krekan

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.