09-01-2016, 04:14 PM
(This post was last modified: 09-01-2016, 04:15 PM by bastibasti.)
I have done a little testing...
The hccap contains exactly 1 hash, the wpa.cap contained multiple, but aircrack lets you select 1 network to export. (I selected my own)
the password is rather long. 41 characters
if I delete everything but my password the result is the same (the rejected rate is 0/1)
The hccap contains exactly 1 hash, the wpa.cap contained multiple, but aircrack lets you select 1 network to export. (I selected my own)
the password is rather long. 41 characters
if I delete everything but my password the result is the same (the rejected rate is 0/1)
Code:
client1 hashcat-2.00 # ./hashcat-cli32.bin -m 2500 3.hccap.hccap common_passwords_from_hacked_websites2.txt
Initializing hashcat v2.00 with 4 threads and 32mb segment-size...
ATTENTION!
The WPA/WPA2 key version in your .hccap file is invalid!
This could be due to a recent aircrack-ng bug.
The key version was automatically reset to a reasonable value.
Added hashes from file 3.hccap.hccap: 1 (1 salts)
Activating quick-digest mode for single-hash with salt
3.hccap.hccap:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
All hashes have been recovered
Input.Mode: Dict (common_passwords_from_hacked_websites2.txt)
Index.....: 1/1 (segment), 105 (words), 1276 (bytes)
Recovered.: 1/1 hashes, 1/1 salts
Speed/sec.: - plains, 101 words
Progress..: 102/105 (97.14%)
Running...: 00:00:00:01
Estimated.: --:--:--:--
Started: Thu Sep 1 14:08:02 2016
Stopped: Thu Sep 1 14:08:03 2016
Code:
client1 cudaHashcat-2.01 # ./cudaHashcat32.bin -m 2500 3.hccap.hccap common_passwords_from_hacked_websites2.txt
cudaHashcat v2.01 starting...
ATTENTION!
The WPA/WPA2 key version in your .hccap file is invalid!
This could be due to a recent aircrack-ng bug.
The key version was automatically reset to a reasonable value.
Device #1: GeForce GTX 560 Ti, 1023MB, 1670Mhz, 8MCU
Hashes: 1 hashes; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Applicable Optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c
Device #1: Kernel ./kernels/4318/m02500.sm_21.32.cubin
Device #1: Kernel ./kernels/4318/amp_a0_v1.sm_21.32.cubin
Generated dictionary stats for common_passwords_from_hacked_websites2.txt: 1276 bytes, 105 words, 105 keyspace
ATTENTION!
The wordlist or mask you are using is too small.
Therefore, oclHashcat is unable to utilize the full parallelization power of your GPU(s).
The cracking speed will drop.
Workaround: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_to_create_more_work_for_full_speed
INFO: approaching final keyspace, workload adjusted
Session.Name...: cudaHashcat
Status.........: Exhausted
Input.Mode.....: File (common_passwords_from_hacked_websites2.txt)
Hash.Target....: Mikrowelle ( <-> )
Hash.Type......: WPA/WPA2
Time.Started...: 0 secs
Time.Estimated.: 0 secs
Speed.GPU.#1...: 0 H/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 105/105 (100.00%)
Rejected.......: 30/105 (28.57%)
HWMon.GPU.#1...: -1% Util, 42c Temp, 30% Fan
Started: Thu Sep 1 14:08:33 2016
Stopped: Thu Sep 1 14:08:36 2016
(09-01-2016, 04:01 PM)jodler303 Wrote: Just guessing.
1) Rejected.......: 30/100 (30.00%) ... are you sure your password hasn't been rejected. I'd try with a second passwordfile that ONLY has your password and see if it gets rejected or not.
2) Do you have multiple handshakes stored in that .cap file when converting it to .hccap with aircrack-ng -J ? If yes, try isolating one handshake to another .cap and then convert that to .hccap using aircrack-ng. Have a look here: https://hashcat.net/forum/thread-5792-po...l#pid31068