hashcat Forum
hcxdumptool status - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: hcxdumptool status (/thread-7733.html)



hcxdumptool status - hasch - 08-09-2018

Managed to dump a PMKID, but hcxdumptool did not saied that it found a PMKID. Maybe because "enable status" does not work on my hashcat Version(latest release) without a number imput. "Enable status 8" prints the request status, but no "found PMKID". Hashcat did not crack the hash after 1,5h, so i think the password is longer than 8 digits. What is the command to crack all possible lenghts ? Just add " l?"s ?


RE: hcxdumptool status - atom - 08-09-2018

The enable status syntax changed in latest version. You need to add a number, see the help menu.

About the mask, please check the mask attack page on wiki: https://hashcat.net/wiki/doku.php?id=mask_attack


RE: hcxdumptool status - ZerBea - 08-09-2018

$ hcxdumptool -h

--enable_status=<digit> : enable status messages
bitmask:
1: EAPOL
2: PROBEREQUEST/PROBERESPONSE
4: AUTHENTICATON
8: ASSOCIATION

Now we use a bitmask to deliver status messages. Read more about usage here:
For example to retrieve EAPOL and PROEBEREQUEST/PROBERESPONSE you can use
--enable_status=1 --enable_status=2
or via bitmask
--enable_status=3

https://hashcat.net/forum/thread-6661-post-41488.html#pid41488