Cracking a password present in wordlist doesn't work
#8
I've updated my hcxdumptool which was 6.2 to 6.3 and made a rescan and now i got the MESSAGEPAIR after the *** on my WPA*01 lines
In my hash file i was able to scan 3 network:

Code:
WPA*02*4039a05f115e8cd2c8ec1fac03e40041*000b18beacc8*0006784bb43a*4c697665626f782d46333438*189dfe9c4eb15ecf14d266803d018fb71d115a4f807387632e07705f4d9cd683*0103007502010a0000000000000000f7922c149c96e80bd392a55bba45bd69ea6f4d7d194ceb7ac48a9c112a9748b31d12000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001630140100000fac020100000fac040100000fac020000*10
WPA*01*c34fa9c6b55fe62801403b00959d3089*6c61f402a7ee*b4e1eb143790*5346525f41374538***01
WPA*01*009fbfdd3bc3f9df472002a45ca0e45d*f46bef4d04a6*b4e1eb143790*4b434d***01

Before the update of the tool, i didn't get the ***01 at the end of the line.
So If i got it right 01 means i got PMKID form the AP so i'd be able to crack the password this time ?

WPA*02 works, I already cracked one.

So far I never got the case where I got a WPA*01 and a WPA*02 for the same MAC_AP.
Not sure I got it right but from a WPA*01, do I need a WPA*02 witht the same MAC_AP to be able to crack it or does the WPA*01 line is enough ?
Reply


Messages In This Thread
RE: Cracking a password present in wordlist doesn't work - by bbjjlk - 07-24-2023, 02:59 PM