11-01-2021, 01:15 PM
(This post was last modified: 11-01-2021, 01:46 PM by CUwindows00.)
ZerBea Ok thank you
I see some hash numbers at the end of it are 05 80 82 84 and so on
Some are challenges, some are authorizations
you use it, I think that it is impossible to classify by relying on these alone, because there is no unified field for challenges and authorizations, and it is impossible to guess what number will appear in the last paragraph.
If there is a unified replacement field at the end, it will be more complete
As i mentioned above
I see some hash numbers at the end of it are 05 80 82 84 and so on
Some are challenges, some are authorizations
Code:
WPA*02****************05
WPA*02****************80
WPA*02****************82
WPA*02****************84
Code:
cat hash.hc22000 | grep WPA.02 | grep 1$
cat hash.hc22000 | grep WPA.02 | grep 2$
you use it, I think that it is impossible to classify by relying on these alone, because there is no unified field for challenges and authorizations, and it is impossible to guess what number will appear in the last paragraph.
If there is a unified replacement field at the end, it will be more complete
As i mentioned above