I haven't broken a hash outside of a lab environment with easy hashes in a long time, so don't expect me to have any good resources, but as far as I understand, for a real world attack, the most efficient thing to do would be to get default keyspace lists for common manufacturers and then run rules-based brute forces against the now-smaller keyspace. Now then, as for wifi cracking in the wild: This won't necessarily effect residential wifi attacks, but for most other uses, it's gonna be pretty weak. It's not going to be too effective in the modern era against most targets, since between then and now, most orgs have mandatory strong password rules that weren't common back then. Keep in mind that rockyou is a dump of social media passwords from 2009. If your password hasn't been discovered in a databreach, then there is no pre-built wordlist that would be able to crack your own wifi. First, for a home lab setup like this where you know the password, check and see if your password has even been compromised and put in a publicly known wordlist.
0 Comments
Leave a Reply. |