05-30-2022, 09:52 PM
Maybe this is just too complicated for me. I have filtered the AP mac as a target, so how came I have some useless junk in my hashes?
Also, isn't it enough to have just one good hash? So in my brain, when I got two hashes instead of just one, cracking the hash would be even more of an expected outcome and I don't understand it.
Now I have repeated the attack inside the new working directory and got two hashes again, for both AP is cc32e562b757 and just the client APs differ, the password is still 'hashcat!' and still nothing was cracked both on the CPU and on the desktop 1660S. So what else can I do?
I can even let the hcxdumptool running for an entire 24h, then run the hashcat on the dozens of collected hashes and still nothing will be cracked, all of this is extremely odd for me.
Also, isn't it enough to have just one good hash? So in my brain, when I got two hashes instead of just one, cracking the hash would be even more of an expected outcome and I don't understand it.
Now I have repeated the attack inside the new working directory and got two hashes again, for both AP is cc32e562b757 and just the client APs differ, the password is still 'hashcat!' and still nothing was cracked both on the CPU and on the desktop 1660S. So what else can I do?
I can even let the hcxdumptool running for an entire 24h, then run the hashcat on the dozens of collected hashes and still nothing will be cracked, all of this is extremely odd for me.