hashcat Forum
WPA/WPA2 half-handshake? - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html)
+--- Thread: WPA/WPA2 half-handshake? (/thread-3524.html)



WPA/WPA2 half-handshake? - hawaii - 07-05-2014

Does oclHashcat support using only EAPOL packets 1 and 2?

After the first 2 packets of the handshake are sent, which contain the anonce and snonce, one should be able to run the handshake to retrieve the PSK, yes?

Wireshark indicates both packets are in the capture, aircrack-ng tells me I have a valid handshake, it writes the hccap, which is successfully loaded into oclhc, yet it never yields the password, though it is in the dictionary.

Anybody know why?


RE: WPA/WPA2 half-handshake? - verdun - 01-03-2015

Packets 1 + 2 and a beacon yields passwords for me. 1+2 is logon and 3+4 verifies validity in theory.


RE: WPA/WPA2 half-handshake? - fonzy35 - 01-19-2015

After I captured a cap file with airmon-ng(and it say 4 way handshake) , i check with wireshark the eapol packets and i got two Eapol saying 2/4 message, 2/4 message.
I use hashcat converter to hccap file and they give me the file, no problem.

I thought we were suppose to have 4 eapol 1/1 , 1/2 , 1/3 , 1/4(in wireshark) to have a successful handshake ?