03-18-2014, 02:13 AM
Got it!!
I think the original capture file had two handshakes in it one was valid and the other corrupt, in EWSA I was able to filter the corrupt handshake out and that is why it was able to crack it and hashcat couldn't.
After a fresh capture and a hccap conversion using aircrack -J I was able to successfully crack the password using the syntax and charset as laid out above. YeeeeHaaaa!
Thanks everyone for your input. I now know that this method works.
Rab.
I think the original capture file had two handshakes in it one was valid and the other corrupt, in EWSA I was able to filter the corrupt handshake out and that is why it was able to crack it and hashcat couldn't.
After a fresh capture and a hccap conversion using aircrack -J I was able to successfully crack the password using the syntax and charset as laid out above. YeeeeHaaaa!
Thanks everyone for your input. I now know that this method works.
Rab.