not with routers, some routers (Cisco) we were able to actually pull the config file out of it and rewrite it, then inject it back into the damn thing using quick make-shift tftp servers. Which was fucking awesome, but, if you were to bruteforce WPA or WPA2 then yeah, the file is a .cap file which get's generated by a sniffing program. If you sniff for WPA or WPA2 you have to deauth a client (send fake "fuck off" packets that the client would think came from the router. Then when the client re-authenticates (usually with windows is instantaneous) you get what's called a handshake which you can bruteforce all you want without the router knowing. but also, my logs in my router don't show a single failed attempt to get in. ?? i tried like 300 passwds on it too. nor does the shitty base station which is odd. If this worked for ssh and telnet, and Server Message Block (windows share) that would be so cool.. I can't believe cpanel is that lame..