understanding wpa hashes
#1
I tried to test someĀ  handshakes that i captured but had no luck with hashcat. So I thought I would try them using https://www.onlinehashcrack.com/wpa

I submitted the pcap file but that site said:
"No valid EAPOL handshake or PMKID found in the submitted file."

I am new to testing this stuff. I captured some handshakes with a pwnagotchi and others using wifite.

How can I tell if the pcap file (or the converted hccapx file) is worth using against hashcat?
Reply


Messages In This Thread
understanding wpa hashes - by skypickle - 06-18-2021, 04:59 AM
RE: understanding wpa hashes - by ZerBea - 06-18-2021, 11:47 PM