![]() |
wpa2 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: wpa2 (/thread-10744.html) |
wpa2 - JamesIsLegend11 - 04-26-2022 Hi guys, im trying to crack my wifi network and see if its possible. I tryed this https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2 and also many other options with hashcat but every time i get to this command "hashcat -m 22000 hash.hc22000 -a 3 ?d?d?d?d?d?d?d?d" Just doesnt work, every time i get this errors "Hash ´hash.hc22000´: Separator unmatched" and "No hashes loaded." Thanks for any help RE: wpa2 - ZerBea - 04-26-2022 The hash file is either damaged or a wrong format. Is the example from here https://hashcat.net/wiki/doku.php?id=example_hashes working? Code: $ hashcat -m 22000 WPA*01*4d4fe7aac3a2cecab195321ceb99a7d0*fc690c158264*f4747f87f9f4*686173686361742d6573736964*** -a 3 "hashcat!" output should look like this: Code: hashcat (v6.2.5-398-gec7eae988) starting If yes, from where did you have hash.hc22000 file? RE: wpa2 - JamesIsLegend11 - 04-26-2022 i i tryed this code ""$ hashcat -m 22000 WPA*01*4d4fe7aac3a2cecab195321ceb99a7d0*fc690c158264*f4747f87f9f4*686173686361742d6573736964*** -a 3 "hashcat!" "" it just gave me "dquote>" also i downloaded all tools from official github RE: wpa2 - ZerBea - 04-26-2022 Are you running a Linux terminal and bash? There is the prompt at the beginning aof your command line as well as lot of """". The terminal doesn't like this. Also possible that it doesn't like the !. Please try this Code: $ hashcat -m 22000 WPA*01*4d4fe7aac3a2cecab195321ceb99a7d0*fc690c158264*f4747f87f9f4*686173686361742d6573736964*** -a 3 hashcat?s BTW: $ stands for command line input - do not add this to your command line. Code: hashcat -m 22000 WPA*01*4d4fe7aac3a2cecab195321ceb99a7d0*fc690c158264*f4747f87f9f4*686173686361742d6573736964*** -a 3 hashcat?s Result should be the same as mentioned above. RE: wpa2 - JamesIsLegend11 - 04-26-2022 yes this command work """ $ hashcat -m 22000 WPA*01*4d4fe7aac3a2cecab195321ceb99a7d0*fc690c158264*f4747f87f9f4*686173686361742d6573736964*** -a 3 hashcat?s """ so wheres the problem, and im using linux RE: wpa2 - ZerBea - 04-26-2022 That sounds good - hashcat is working as expected. Next question: from where did you have the hash.hc22000 file? Do the lines inside this file begin with Code: WPA*01*.... Is hash.hc22000 in your working directory? If not, you will get this: Code: $ hashcat -m 22000 test.22000 -a3 ?d?d?d?d?d?d?d?d RE: wpa2 - JamesIsLegend11 - 04-26-2022 The hash WPA*02*.... and i used this method and these tools https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2 Also thanks for helping me out RE: wpa2 - ZerBea - 04-26-2022 Are you firm with Linux? If not, $ pwd will give you the working directory and $ ls the content of if hash.hc22000 should be listed. RE: wpa2 - JamesIsLegend11 - 04-26-2022 Yes even when im in directory like [~/Desktop] and then run the commant it still say "No hashes loaded" and "Hashfile´hash.hc22000´ on line 1 (WPA*02...) : Salt-lenght exception" RE: wpa2 - ZerBea - 04-26-2022 To make sure, you have permission to read from that directory, please try this: Code: $ echo "WPA*01*4d4fe7aac3a2cecab195321ceb99a7d0*fc690c158264*f4747f87f9f4*686173686361742d6573736964***" > test.22000 hashcat now read the file and recover the PSK: Code: hashcat (v6.2.5-400-gf31dcc5d1) starting |