hcxdumptool status - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: hcxdumptool status (/thread-7733.html) |
hcxdumptool status - hasch - 08-09-2018 Managed to dump a PMKID, but hcxdumptool did not saied that it found a PMKID. Maybe because "enable status" does not work on my hashcat Version(latest release) without a number imput. "Enable status 8" prints the request status, but no "found PMKID". Hashcat did not crack the hash after 1,5h, so i think the password is longer than 8 digits. What is the command to crack all possible lenghts ? Just add " l?"s ? RE: hcxdumptool status - atom - 08-09-2018 The enable status syntax changed in latest version. You need to add a number, see the help menu. About the mask, please check the mask attack page on wiki: https://hashcat.net/wiki/doku.php?id=mask_attack RE: hcxdumptool status - ZerBea - 08-09-2018 $ hcxdumptool -h --enable_status=<digit> : enable status messages bitmask: 1: EAPOL 2: PROBEREQUEST/PROBERESPONSE 4: AUTHENTICATON 8: ASSOCIATION Now we use a bitmask to deliver status messages. Read more about usage here: For example to retrieve EAPOL and PROEBEREQUEST/PROBERESPONSE you can use --enable_status=1 --enable_status=2 or via bitmask --enable_status=3 https://hashcat.net/forum/thread-6661-post-41488.html#pid41488 |