Unpublished WPA key algorithms

drsnooker

Active member
Contributor
VIP Member
Feedback: 0 / 0 / 0
Joined
Aug 1, 2020
Messages
532
Reaction score
843
Credits
4,907
In some cases the serial number is actually captured with the handshake. You can open the cap in a text editor and scroll around and perhaps spot the SN in plain text. strings filename.cap would work, or you could use wireshark.
If the SN is not in the cap, you have still reduced the parameter space from all possible passwords to all possible serial numbers. You'll just need to generate the table of passwords that correspond to each possible serial number. It's not as daunting as you might think, as we think the SN has a production year and week in it, and thus there are only 100million or so possible. This is much less than 36^10.
But that last step requires you to read the discussion in this thread regarding SN ranges and learn a little python.
 

john1

Member
Feedback: 0 / 0 / 0
Joined
Mar 1, 2026
Messages
8
Reaction score
1
Credits
50
@drsnooker
Hashcat doesn't support cracking 13-character passwords, or at least I can't do it; even if it could, it would take too long.
 

drsnooker

Active member
Contributor
VIP Member
Feedback: 0 / 0 / 0
Joined
Aug 1, 2020
Messages
532
Reaction score
843
Credits
4,907
You use python and the algorithm to create a dictionary of passwords using the range of serial numbers. Then hashcat will crack it in minutes. (unless the user changed the password and it is no longer default)
 

drsnooker

Active member
Contributor
VIP Member
Feedback: 0 / 0 / 0
Joined
Aug 1, 2020
Messages
532
Reaction score
843
Credits
4,907
If you want to be a hacker, you will need to learn how to code eventually! Although with the AI boom going on, perhaps learning to code is overrated and you can simply ask chatGPT to write the code for you.
If that is a bridge too far, perhaps just post your cap in https://forum.hashkiller.io/index.php?forums/wpa-packet-cracking.16/
and have the experts there crack it for you.
 

drsnooker

Active member
Contributor
VIP Member
Feedback: 0 / 0 / 0
Joined
Aug 1, 2020
Messages
532
Reaction score
843
Credits
4,907
If you find it let us know! Most passwords are calculated in the factory and burnt into NVRAM. When you factory reset, it just pulls the data from NVRAM. It does not re-calculate the password.
 

drsnooker

Active member
Contributor
VIP Member
Feedback: 0 / 0 / 0
Joined
Aug 1, 2020
Messages
532
Reaction score
843
Credits
4,907
There is an algorithm, we just have not found it yet. ZTE's algorithm has not left the factory. No intern has forgotten to delete it from the firmware...
 
Top