04-26-2022, 02:16 PM
To make sure, you have permission to read from that directory, please try this:
hashcat now read the file and recover the PSK:
Code:
$ echo "WPA*01*4d4fe7aac3a2cecab195321ceb99a7d0*fc690c158264*f4747f87f9f4*686173686361742d6573736964***" > test.22000
$ hashcat -m 22000 test.22000 -a 3 hashcat?s
hashcat now read the file and recover the PSK:
Code:
hashcat (v6.2.5-400-gf31dcc5d1) starting
...
4d4fe7aac3a2cecab195321ceb99a7d0:fc690c158264:f4747f87f9f4:hashcat-essid:hashcat!
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL)
Hash.Target......: test.22000
Time.Started.....: Tue Apr 26 14:14:19 2022 (0 secs)
Time.Estimated...: Tue Apr 26 14:14:19 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Mask.......: hashcat?s [8]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 430 H/s (0.70ms) @ Accel:8 Loops:128 Thr:512 Vec:1
Recovered.Total..: 1/1 (100.00%) Digests
Progress.........: 33/33 (100.00%)
Rejected.........: 0/33 (0.00%)
Restore.Point....: 0/33 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: hashcat! -> hashcat
Hardware.Mon.#1..: Temp: 47c Fan: 29% Util: 83% Core:1835MHz Mem:5005MHz Bus:16