04-22-2012, 09:27 PM
I have been looking all over for the best way to crack a WPA2 hash. I have tried aircrack, but that doesn't have GPU acceleration, I have tried pyrit (which is great) but that doesn't run on windows, then I came across hashcat and I have great hope for it, but for some reason it cannot find a known key out of a WPA2 hash.
I got the hash from the Wireshark website: http://wiki.wireshark.org/SampleCaptures -> Induction.pcap sample
I then conformed it to .hccap and also made a sample password list including the password: [ Induction ].
When I ran it through hashcat-plus, it ran fine, but came up with 0/6 rejected and nothing found.
I know many people come on here complaining about known hashes not working and this is due to the password being under 8 or over 15 characters (I've done my research). But I have no explanation for this.
I tried it in aircrack and it got it successfully which is the part that's so confusing. Is the original .pcap file invalid for hashcat, am I doing something else correctly. Help would be appreciated.
I got the hash from the Wireshark website: http://wiki.wireshark.org/SampleCaptures -> Induction.pcap sample
I then conformed it to .hccap and also made a sample password list including the password: [ Induction ].
When I ran it through hashcat-plus, it ran fine, but came up with 0/6 rejected and nothing found.
I know many people come on here complaining about known hashes not working and this is due to the password being under 8 or over 15 characters (I've done my research). But I have no explanation for this.
I tried it in aircrack and it got it successfully which is the part that's so confusing. Is the original .pcap file invalid for hashcat, am I doing something else correctly. Help would be appreciated.