02-11-2016, 11:39 PM
Code:
root@The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali):~# aircrack-ng -J dump Dump.CAP
Opening Dump.CAP
Read 2202 packets.
# BSSID ESSID Encryption
1 00:30:0D:AB:E2:AC WPA (1 handshake)
2 CC:8C:66:AB:E2:AC Unknown
3 00:30:0D:AB:A2:8F Unknown
4 00:30:0D:03:FA:75 Unknown
5 00:B0:59:67:F4:75 Unknown
6 00:CA:50:9A:0D:9B Unknown
7 00:30:0D:8B:F7:75 Unknown
8 AE:31:0D:AB:E2:2C WPA (0 handshake)
9 00:AD:F6:AB:E2:AC WPA (0 handshake)
<snip>
Index number of target network ? 1
Opening Dump.CAP
An ESSID is required. Try option -e.
root@The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali):~#
There's no ESSID broadcast in that .cap file either and you'll need that to have a go at cracking. I'm no network expert so can't identify the WPA type from the .cap file but it may not even be crackable if there's a RADIUS server involved, i.e. if it's WPA-Enterprise (WPA-802.1x, RADIUS).