06-25-2021, 05:55 PM
(This post was last modified: 06-25-2021, 05:55 PM by Jimis 3:16.)
(06-24-2021, 10:43 PM)trebla Wrote:(06-24-2021, 09:44 AM)Jimis 3:16 Wrote: Ok, I checked what you say. Now what I should do?From your image it looks like mode 22000 is most probable. Check that the hash you are trying to crack starts with the same characters, WPA*01* then 32 hex characters * again etc. If your hash line is correct like in the image hashcat should load the hash line if you start it with hashcat -m 22000 hashfile <insert attack here> where hashfile is the file where the hash you are trying to crack is stored. Attack can be any attack hashcat supports. Wordlist, mask etc.
Maybe first you can try to crack the example hash and see if it works. The password for the example hash is hashcat! so it's easy to crack. For instance try to crack it with attack -a 3 ?l?l?l?l?l?l?l?s, that is 7 lowercase characters + one special. That should crack the example hash.
Finally, I managed to start cracking wpa hash with live generating wordlist (abcdefghijklmnopqrstuvwxyz1234567890)
I can checkpoint the process It makes, I can see the process live, for example now still is 0.08%, It's ok though, I can save It by clicking letter C on my keyboard and next time typing command: hashcat.exe --session=hashcat --restore
Something strange is that the words didn't start from aaaaaaaa but from random letters, do you think anything's wrong??