WPA2 Attack from dictionary has bug?! (Solved) - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html) +--- Forum: Very old oclHashcat-plus Support (https://hashcat.net/forum/forum-23.html) +--- Thread: WPA2 Attack from dictionary has bug?! (Solved) (/thread-1750.html) |
WPA2 Attack from dictionary has bug?! (Solved) - Buran - 11-12-2012 Code: oclHashcat-plus v0.09 by atom starting... The dictionary has 7bit ASCII haracters returned by "enca" May be anyone explain me, that the f...... ??? RE: WPA2 Attack from dictionary has bug?! - epixoip - 11-12-2012 this is an issue with your terminal encoding, not an issue with hashcat. just because enca says the dictionary contains ascii characters doesn't mean you don't have some other characters in your dictionary as well. use -o to capture the password to a file for further analysis. RE: WPA2 Attack from dictionary has bug?! - Buran - 11-12-2012 (11-12-2012, 09:37 AM)epixoip Wrote: ...Thanx for reply. I checked again with '-o' but result is the same. mcedit shows all words in dictionary is 'ok'. The dictionary has no words with broken-nonprintable symbols. Anything else to help me? RE: WPA2 Attack from dictionary has bug?! - epixoip - 11-12-2012 hexdump -C your output file. RE: WPA2 Attack from dictionary has bug?! - epixoip - 11-12-2012 i also notice you're running in stdin mode, not a straight dictionary attack -- what are you doing to your dictionary before piping it into hashcat? RE: WPA2 Attack from dictionary has bug?! - Buran - 11-12-2012 (11-12-2012, 11:12 AM)epixoip Wrote: i also notice you're running in stdin mode, not a straight dictionary attack -- what are you doing to your dictionary before piping it into hashcat? I tried a lot of different commands... Results is the same. This is just an example number 9 Code: pyrit -o - export_passwords | ./oclHashcat etc. I was ran with command: Code: ./oclHashcat-plus32.bin --gpu-loops 256 --gpu-temp-retain 60 -m 2500 -n 80 tplink.hccap 1.dic oclHashcat-plus v0.09 by atom starting... This password is '0987654321qaz' Have I write wrong command? HEXdump this hash: Code: hexdump -C FIND1.txt HEXdump previous (first) hash: Code: hexdump -C FIND.txt RE: WPA2 Attack from dictionary has bug?! (Solved) - Buran - 11-12-2012 Thank you, epixoip, for the help attempts! Problem solved. If the parameter --gpu-accel not equal 40, then HashCat-plus write password not found (-n > 40) or cracked with empty password (-n < 40). Passwords found and display it correct if only '-n 40' option presents. ATI Sapphire HD5870 OC. RE: WPA2 Attack from dictionary has bug?! (Solved) - epixoip - 11-13-2012 sounds like your problems are the result of aggressive overclocking. RE: WPA2 Attack from dictionary has bug?! (Solved) - Buran - 11-14-2012 (11-13-2012, 09:05 AM)epixoip Wrote: sounds like your problems are the result of aggressive overclocking.Yes, sounds like... But no overclock presents! RAM also in good condition. Thank you, once more! |