WPA handshake files

Do you have a question? Post it now! No Registration Necessary.  Now with pictures!

Threaded View

This is crossposted. I've asked this question in the crypto newsgroups. I  
have a place in mind but I can't remember where. I have collected six WPA  
handshake files. Now that I am getting somewhere with high power directional  
WiFi, I figure I could collect up to ninety WPA handshake files. WPA  
handshake files are tedious to crack or, impossible to crack, in one big  
bang time. Or so they say. True randomness is next to impossible.

I don't want to do the work of finding underlying patterns in a collection  
of WPA handshake files, but maybe some else will do the research.

My question is, where to find an anonymous upload website where these files  
can be placed, stored and then downloaded anonymously? Or maybe a suggestion  
for an NNTP newsgroup and storage for maybe a year on a server somewhere?

Anonymously Yours,


Re: WPA handshake files

Norm X wrote:
Quoted text here. Click to load it

Do you really need to crack them, or is it more fun to dream about them ?



Re: WPA handshake files

"Paul"  wrote

Quoted text here. Click to load it

WPA cracking takes prodigious CPU power. Dictionary attacks tend not to  
work. Amazon EC2 cloud computing has been around for a while. Now Google  
comes to the rescue:


I have a modest GPU but it is not supported by a popular Russian WPA cracker  
program. Cloud cracking is the way to go.

I cannot understand why people devote GPGPUs to Bitcoin hash computing when  
cloud computing is more efficient? Eventually Bitcoin will be cracked and  
someone will be much richer, others poorer. Bitcoin is not supported by  
government hence no government law enforcement agency will not retaliate.  
Anonymous supports Bitcoin. Anonymous will retaliate. I laugh at Anonymous  
because I am anonymous.


Re: WPA handshake files

Norm X wrote:
Quoted text here. Click to load it

Have you seen the latest hardware table for Bitcoin ?
It's hilarious. This will show you, why a processor in the
Amazon cloud, doesn't have a chance. Look at the ratio,
between a "Hashblaster" and a CPU.


HashBlaster       3,300,000 megahash/sec   $8799 purchase price
7970 video card         700 megahash/sec   $ 500
E8400 processor           7 megahash/sec   $ 180

The people who bought the video cards, are
now "officially screwed" :-)


CPU --> GPU --> FPGA --> Custom Silicon
   7     700              3,300,000

We're now in the era of custom silicon. I don't know
where the venture capital came from to spin custom
silicon, but several companies have managed to do it.
And they're spinning ridiculously small quantities of
chips. You could do their entire production run, with
a couple sample wafers from the fab. Really weird
economics for silicon. Not normal at all. Normally,
when you design custom silicon, your production run
would involve larger numbers of chips.

Actually, some of the people who have built bitcoin
boxes with multiple video cards, work for a living
at busting passwords (penetration testing). So the
nice thing about the video cards, is they're re-programmable,
and can handle slightly different problems with ease.


Re: WPA handshake files

On 01/30/2014 03:28 PM, Paul wrote:
Quoted text here. Click to load it

Back in the old days (like, mid '70s when VLSI was a struggling baby  
tech) they had to use some kind of technology whose name I've forgotten,  
kind of like a silk-screening photographic-negative thinger, and then  
grow the chips and so forth; the economic break-even point was some huge  
number of chips, they were doing good to keep failure rates below 5%, etc.

These days, think 3D-printing, everything from circuit-design to  
chip-printing in one data stream, lot-sizes of 1 as economically  
feasible as a thousand, clean-room becomes an obsolete concept since  
only the printer internals need to be clean, so forth.

Or maybe I'm way out in left field, who knows.

Re: WPA handshake files

crankypuss wrote:
Quoted text here. Click to load it

They used to do it, by making masks.


And the process is photolithography. A wafer might have to go
through as many as seventy process steps, before it's finished.
And it can mean a wait of 12 weeks, until your wafers "come out
of the Easy Bake oven". It's not exactly a fast process. It's
painstaking, and in a good fab, most if not all of it uses
robots (humans sit around watching TV monitors and LCD screens).
In older fabs, there would be more manual handling of product
(carrying around sealed containers with wafers inside, from
one station to another).


At work, the number bandied about was one million per chip,
for a set of masks. So if you made a single mistake, you
could lose your company a million bucks. For small errors,
designs have "spare transistors" which can be connected with
an upper layer in the design, and I assume that "patch panel"
capability exists for repairing errors with a minimum set of
changes to masks. So it doesn't cost you the whole million,
but a fraction of that. Another company I worked with, they
did a CYA using those transistors, to correct some wiring
errors. Then ran off another set of chips. That technique
only "works for tiny mistakes", not big ones. The main cost
for a tiny mistake, is a 12 week wait for new chips. I
only know about that, because they were explaining why
they'd be back in three months time :-)

There are some university consortia, where students can
design chips, and there would be a few instances of that
chip on a wafer. So the wafer would have a whole bunch
of different chip designs on it. When they have enough
designs, they can run off a few of those mixed wafers.
So that's how the academic community gets some of their
stuff. By sharing a wafer with others, and some government
body partially funds the effort.

The guys making those Bitcoin hashing chips, I would
expect they'd get the whole wafer to themselves. And
be paying the non-refundable million bucks for
a set of masks, when their design is finished.
I have no idea what a processed wafer costs these
days, but it's considerably less than the masks.
(I guess it all depends on how you plan to pay off
the $2 billion bucks it costs to build a fab. The prices
I've heard for wafers, makes them sound too cheap compared
to the capital cost of the facility to make them.)


Re: WPA handshake files

"Paul"  wrote
Quoted text here. Click to load it

Still, all this is about as convincing as the now discredited "Greenhouse  

Notorious Ponzi Shaman Satoshi Nakamoto distributed hundreds of thousands of  
free bitcoins for sake of promotion at startup and he kept 400,000 for  
himself. At startup, the value of a bitcoin was around $0.01 and was used  
for buying trading cards at Japanese site Mt. Gox which is now bankrupt. We  
are now only beginning to hear of the tip of the iceberg of the hidden  
bankruptcies and wasted electric power caused by Satoshi Nakamoto's Ponzi  

People are dying:

Bitcoin exchange First Meta CEO Autumn Radtke found dead

Satoshi Nakamoto's Ponzi scheme may not be as elaborate, as well known or as  
hurtful as the "Greenhouse Global Warming" Ponzi scheme but it too used  
computers and economic theory to transfer wealth from the stupid to the  

And yes I managed to get my WPA handshake files uploaded to  
alt.binaries.comp Thank you.  

Re: WPA handshake files

Norm X wrote:
Quoted text here. Click to load it

In a pyramid scheme, it always pays to be on top.

I expect Satoshi just wanted to pay off his mortgage.
In the picture of him I saw, he didn't really
look the part of a super-villain.


Re: WPA handshake files

"Paul" wrote

Quoted text here. Click to load it

I wonder what classified government work he did? He must be a top  
crypto-analyst. By comparison, Edward Snowden is a simple snitch.  

Re: WPA handshake files

Quoted text here. Click to load it


"We were doing defensive electronics and communications for the military,  
government aircraft and warships, but it was classified and I can't really  
talk about it," David Micha, the president of the company now called L-3  
Communications, recalled of the work his former employee did there.

Reprinted with permission from Russia Today.  

Re: WPA handshake files

"Norm X" wrote

Quoted text here. Click to load it

Assigned to L-3 communication:

United States Patent 8,606,171
Haverty  December 10, 2013
Methods of suppressing GSM wireless device threats in dynamic or wide area  
static environments using minimal power consumption and collateral  


Techniques for detecting wireless devices that are signaling in high  
proximity to a convoy or other operation and preventing messages from  
reaching the wireless devices. One class of the techniques uses surgical  
jamming methodologies that minimize power consumption and collateral  
interference, while being maximally inconspicuous; another class uses  
baiting beacons to prevent the messages from reaching the wireless devices.  
Still another class of techniques denies wireless devices access to a  
wireless network. An exemplary embodiment applies the techniques to wireless  
devices and beacons in a GSM network.  

Re: WPA handshake files

Quoted text here. Click to load it

Denial, denial denial. Not only is Satoshi Nakamoto in denial, so is L3  

From Google's cache of http://www.l-3nss.com/



Full-Spectrum Cyber Operations

We provide secure communications, information systems' networks and mobile  
devices, and ensure the integrity of information to facilitate trusted,  
interconnected, and resilient networked defense. We also provide  
capabilities to support lawful offensive operations.


The NSA crowd that invented TOR also invented Bitcoin.

Site Timeline