So the beacon should be with those packets I take it? Would somebody mind taking a quick look at this cap file and let me know if all is there to continue cracking with oclhashcat please? I'm guessing that everything I need is there, the 1, 2 & 3 packets are at the beginning of those eapol packets captured & Pyrit shows the following -
#1: AccessPoint 20:0c:c8:xx:xx:xx ('VMxxxxx-2G'):
#1: Station 28:18:78:xx:xx:xx, 4 handshake(s):
#1: HMAC_SHA1_AES, good, spread 1
#2: HMAC_SHA1_AES, good, spread 3
#3: HMAC_SHA1_AES, bad, spread 2
#4: HMAC_SHA1_AES, bad, spread 5
#2: Station 60:21:c0:xx:xx:xx
Here's the cap file - https://www.mediafire.com/?gxh13c760zt9ls4
Many thanks Fonzy35 for your response, it's appreciated.
#1: AccessPoint 20:0c:c8:xx:xx:xx ('VMxxxxx-2G'):
#1: Station 28:18:78:xx:xx:xx, 4 handshake(s):
#1: HMAC_SHA1_AES, good, spread 1
#2: HMAC_SHA1_AES, good, spread 3
#3: HMAC_SHA1_AES, bad, spread 2
#4: HMAC_SHA1_AES, bad, spread 5
#2: Station 60:21:c0:xx:xx:xx
Here's the cap file - https://www.mediafire.com/?gxh13c760zt9ls4
Many thanks Fonzy35 for your response, it's appreciated.