![]() |
trying to crack my onw WPA - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: General Help (https://hashcat.net/forum/forum-8.html) +--- Thread: trying to crack my onw WPA (/thread-2590.html) |
trying to crack my onw WPA - thorke27 - 09-04-2013 I captured the handshake using commview with this rule: (hex(00888E) and (FTYPE=2 and Fsubtype=8)) I provided a dictionary with the real password at the last position. using aircrack I found to crack it... that means the handshake is right... but when i try to upload the same HandShake to "https://hashcat.net/cap2hccap/" it gives me this error "[error ] unable to find valid handshakes." how comes that aircrack sees the handshake and successfuly cracks it but when i try to convert to hccap doesnt find valid handshake? tried to convert manually with the guide shown in this site but doesnt work. ESSID:dlink_B BSSID:F8:1A:67:88:B7:FC RE: trying to crack my onw WPA - atom - 09-04-2013 You can use aircrack -J option to let aircrack convert it to .hccap RE: trying to crack my onw WPA - thorke27 - 09-04-2013 C:\Users\Daniel\Desktop\Cracking\HashCat\capTOhccap>aircrack-ng.exe -J HSdlink_B .cap dlink_B.hccap Opening dlink_B.hccap open failed: No such file or directory Read 0 packets. No networks found, exiting. Quitting aircrack-ng... doesnt work what am i doing wrong? RE: trying to crack my onw WPA - Mangix - 09-04-2013 I believe it's input first and then output. If you read what aircrack-ng says, it can't find the input file. Also, you may want to run wpaclean prior to this. wpaclean [output] [input] RE: trying to crack my onw WPA - thorke27 - 09-04-2013 (09-04-2013, 08:51 AM)Mangix Wrote: I believe it's input first and then output. If you read what aircrack-ng says, it can't find the input file. thx alot Mangix it worked finally... But now when i load the file to hashcat the button stays grayed/disabled =s Building Hashcat (1.00) file... [*] ESSID (length: 7): dlink_B [*] Key version: 2 [*] BSSID: F8:1A:67:88:B7:FC [*] STA: CC:3A:61:82:C4:2B [*] anonce: 78 AB 1D F9 DC CC A3 28 0E 72 D5 AB 4A 32 FD 2C FB 16 81 DF AB CA 96 16 3B 3E 77 FB 24 23 61 9F [*] snonce: 17 63 1E 1F 2D 03 65 CE AF 57 7B 92 45 AC 91 1D DE 77 54 00 1F 5A 7A BE 88 49 A5 89 B5 4A F1 06 [*] Key MIC: 89 5A E8 92 B5 2C 84 BD 7C B9 4B CA 48 01 23 B4 [*] eapol: 01 03 00 75 02 01 0A 00 00 00 00 00 00 00 00 00 01 17 63 1E 1F 2D 03 65 CE AF 57 7B 92 45 AC 91 1D DE 77 54 00 1F 5A 7A BE 88 49 A5 89 B5 4A F1 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 30 14 01 00 00 0F AC 04 01 00 00 0F AC 04 01 00 00 0F AC 02 00 00 Successfully written to b.hccap RE: trying to crack my onw WPA - thorke27 - 09-04-2013 solved that too i had to pick the binary to the .exe but... its not using cuda =S RE: trying to crack my onw WPA - thorke27 - 09-04-2013 using the plus version solved it! THX its working all now. |