General statistics
List of Youtube channels
Youtube commenter search
Distinguished comments
About
David Bombal
comments
Comments by "" (@dingokidneys) on "" video.
Mixed mode will drop back to WPA2 if that's the only way to get a connection so, yes it should work if you're using a bad password and some client devices that use WPA2.
3
The handshake only gives you the password hash. You then need to use other means to crack the hash, which is what hashcat and the wordlists he was using are meant to do. There's never a guarantee that the hash cracking will work. You may need additional information and heavy hardware resources to have a good chance of cracking anything that is not a silly, simple password.
3
As David said there, only attack your own networks or networks you have permission to attack. Deauth attacks are very noisy and attract attention, like from law enforcement. I need to show this video to some of my neighbours as they have really bad WPA2 passwords. 🤔🙄
2
Hashcat with a decent GPU using a brute force attack should definitely crack it in a few hours I would think, even less if they can work out that you're not using lower case characters.
1
 @landrover827 If you switch the routers around and have no port forwarding on your 'secure' router (which is behind 'insecure' which links to modem) your 'secure' network should be as safe as if it was just connected via the modem to the internet. Otherwise, you may be able to use some firewall rules on router 1 to lock router 2 out of going anywhere other than out through the modem.
1
I've cracked bad wifi passwords on a 2008 Dell laptop without GPU support in seconds. I then used hashcat with GPU support to crack some other somewhat more complex passwords within a few hours. I have a wifi password that is 20 random characters and tried to crack it with hashcat using all the wordlists available to me, then via brute force which quickly told me that it would take some thousands of years to work through that character space. I didn't bother letting that one run.
1