Plugins 2500/2501 and 16800/16801 are deprecated - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Plugins 2500/2501 and 16800/16801 are deprecated (/thread-10253.html) |
RE: Plugins 2500/2501 and 16800/16801 are deprecated - ZerBea - 12-05-2023 (12-05-2023, 01:53 PM)yuXfar Wrote: running both cpmmands Ugly copy and paste error. We are now on level of converting the hashes and hcxpcapngtool should do that: Code: $ hcxpcapngtool *.pcapng -o test.hc22000 I've a way of to many open terminals here (coding new features, testing a new device, running hashcat and answering questions). RE: Plugins 2500/2501 and 16800/16801 are deprecated - yuXfar - 12-05-2023 Thank you so much for the help dev. 🙇♀️🙇🙇 RE: Plugins 2500/2501 and 16800/16801 are deprecated - yuXfar - 12-05-2023 so I've tried something, i replace dumpfile.pcapng to the pcapng file that showed up again after i ls command, so here is the result Warning: out of sequence timestamps! This dump file contains frames with out of sequence timestamps. That is a bug of the capturing tool. session summary --------------- processed pcapng files................: 1 RE: Plugins 2500/2501 and 16800/16801 are deprecated - ZerBea - 12-05-2023 Looks looks there is a dump file from another tool inside your directory that hcxpcapngtool has converted. This bug has been fixed on hcxdumptool and hcxpcapngtool since v6.2.9. RE: Plugins 2500/2501 and 16800/16801 are deprecated - yuXfar - 12-07-2023 Hi dev, where can I find the results of the attack I made after the attack is done? RE: Plugins 2500/2501 and 16800/16801 are deprecated - ZerBea - 12-07-2023 Here in case of hcxdumptool (dump file in pcapng format): stored by hcxdumptool in working directory Code: -w <outfile> : write packets to a pcapng-format file named <outfile> Here in case of converted files by hcxpcapngtool (hash file in hc22000 format) stored by hcxpcapngtool in working directory -o <file> : output WPA-PBKDF2-PMKID+EAPOL hash file (hashcat -m 22000) get full advantage of reuse of PBKDF2 on PMKID and EAPOL [/code] Here in case of hashcat (recoverd PSK in hashcat out file format): via hashcat show option Code: --show | | Compare hashlist with potfile; show cracked hashes | stort in hashcat config directory Code: $ cat $HOME/.hashcat/hashcat.potfile RE: Plugins 2500/2501 and 16800/16801 are deprecated - yuXfar - 12-08-2023 Thanks dev, so I just realized this but when I run wordlist attack command, I didn't specify my own network to be attacked. |