Sorry to bother but I think I'm loosing something obvious here, please be kind
I capture and obtain a file. I export hashes and get:
file name....................: home.pcapng
file type....................: pcapng 1.0
file hardware information....: x86_64
file os information..........: Linux 4.15.0-32-generic
file application information.: hcxdumptool 4.2.1
network type.................: DLT_IEEE802_11_RADIO (127)
endianess....................: little endian
read errors..................: flawless
packets inside...............: 2781
skipped packets..............: 0
packets with FCS.............: 1571
beacons (with ESSID inside)..: 11
probe requests...............: 4
probe responses..............: 15
association requests.........: 701
association responses........: 1037
authentications (OPEN SYSTEM): 792
authentications (BROADCOM)...: 289
EAPOL packets................: 222
EAPOL PMKIDs.................: 4
4 PMKID(s) written to home.16800
I suppose I have some valid PMKIDs here. The AP is mine, so I know the key and put it in a file with a dozen other fake passwords.
I would like to password guess my password, to test all the process so I run:
./hashcat64.bin -m 16800 /Work/cap/home.16800 /Work/cap/t.txt
It runs but gets no password at all:
Session..........: hashcat
Status...........: Exhausted
Hash.Type........: WPA-PMKID-PBKDF2
Hash.Target......: \Work\cap\home.16800
Time.Started.....: Fri Aug 17 13:44:49 2018 (1 sec)
Time.Estimated...: Fri Aug 17 13:44:50 2018 (0 secs)
Guess.Base.......: File (\Work\cap\t.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#3.....: 279 H/s (0.34ms) @ Accel:32 Loops:16 Thr:256 Vec:1
Recovered........: 0/4 (0.00%) Digests, 0/4 (0.00%) Salts
Progress.........: 156/156 (100.00%)
Rejected.........: 0/156 (0.00%)
Restore.Point....: 39/39 (100.00%)
Candidates.#3....: djshhjshjVolumeindr -> 9Dir(s)219.174.809.600bytesfree
HWMon.Dev.#3.....: Temp: 56c Fan: 0% Util: 63% Core:1070MHz Mem: 900MHz Bus:4
What am I missing in the process? (/Work/cap/t.txt is my dictionary with the correct PSK)
Thanks
I capture and obtain a file. I export hashes and get:
file name....................: home.pcapng
file type....................: pcapng 1.0
file hardware information....: x86_64
file os information..........: Linux 4.15.0-32-generic
file application information.: hcxdumptool 4.2.1
network type.................: DLT_IEEE802_11_RADIO (127)
endianess....................: little endian
read errors..................: flawless
packets inside...............: 2781
skipped packets..............: 0
packets with FCS.............: 1571
beacons (with ESSID inside)..: 11
probe requests...............: 4
probe responses..............: 15
association requests.........: 701
association responses........: 1037
authentications (OPEN SYSTEM): 792
authentications (BROADCOM)...: 289
EAPOL packets................: 222
EAPOL PMKIDs.................: 4
4 PMKID(s) written to home.16800
I suppose I have some valid PMKIDs here. The AP is mine, so I know the key and put it in a file with a dozen other fake passwords.
I would like to password guess my password, to test all the process so I run:
./hashcat64.bin -m 16800 /Work/cap/home.16800 /Work/cap/t.txt
It runs but gets no password at all:
Session..........: hashcat
Status...........: Exhausted
Hash.Type........: WPA-PMKID-PBKDF2
Hash.Target......: \Work\cap\home.16800
Time.Started.....: Fri Aug 17 13:44:49 2018 (1 sec)
Time.Estimated...: Fri Aug 17 13:44:50 2018 (0 secs)
Guess.Base.......: File (\Work\cap\t.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.Dev.#3.....: 279 H/s (0.34ms) @ Accel:32 Loops:16 Thr:256 Vec:1
Recovered........: 0/4 (0.00%) Digests, 0/4 (0.00%) Salts
Progress.........: 156/156 (100.00%)
Rejected.........: 0/156 (0.00%)
Restore.Point....: 39/39 (100.00%)
Candidates.#3....: djshhjshjVolumeindr -> 9Dir(s)219.174.809.600bytesfree
HWMon.Dev.#3.....: Temp: 56c Fan: 0% Util: 63% Core:1070MHz Mem: 900MHz Bus:4
What am I missing in the process? (/Work/cap/t.txt is my dictionary with the correct PSK)
Thanks