Why it cant crack my own hash - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Why it cant crack my own hash (/thread-9845.html) |
Why it cant crack my own hash - efilon - 02-03-2021 I tried to crack my own hash. File xxx.hccapx contains 2 WPA hanshakes. I pass first 3 sign of password to decrease time of process. What am i doing wrong? I tried also with: -1 ?H Code: ┌──(root💀The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali))-[/home/The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali)/Desktop] RE: Why it cant crack my own hash - ZerBea - 02-04-2021 1) pocl isn't the best choice - use Intel compute runtime instead you may have noticed that the robot from the forum changed the name of K A L I, because this distribution doesn't handle OpenCL (and some other things), well 2) are you able to recover the PSK from the example hash: https://hashcat.net/misc/example_hashes/hashcat.hccapx from the example hashes, here: https://hashcat.net/wiki/doku.php?id=example_hashes 3) have you tried to retrieve a PMKID and recover the PSK from it? 4) have you tried hashmode 22000 instead of deprecated hashmode 2500? 5) are you sure, you captured and converted a valid EAPOL message pair? Which tools did you use for capturing and converting? RE: Why it cant crack my own hash - efilon - 02-05-2021 1. If no The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) then what? 2. I'll try tomorrow. 4. No i didn't know it is deprecated 5 airodump-ng and cap2hccapx RE: Why it cant crack my own hash - ZerBea - 02-05-2021 Recommended distribution (from hashcat team) is UBUNTU. It is user friendly, especially for Linux beginners. Hashmode 22000 is no longer binary format. It combine 16800 (PMKID) and 2500 (EAPOL) in one single (ASCII) file. cap2hccapx is not able to convert WiFi traffic to 22000 format. airodump-ng is the best choice in combination with aircrack-ng, but not the best choice to use it with hashcat. airdodump-ng (and aireplay-ng) doesn't provide PMKID attack vector. |