Cracking a password present in wordlist doesn't work
#22
I recommend to play around with this example hash to get overview of the capabilities/advantages of the MESSAGEPAIR.

One last example. We move the MESSAGEPAIR from an authorized one to a challenge:
Code:
$ hashcat -m 22000 "WPA*02*024022795224bffca545276c3762686f*6466b38ec3fc*225edc49b7aa*54502d4c494e4b5f484153484341545f54455354*10e3be3b005a629e89de088d6a2fdc489db83ad4764f2d186b9cde15446e972e*0103007502010a0000000000000000000148ce2ccba9c1fda130ff2fbbfb4fd3b063d1a93920b0f7df54a5cbf787b16171000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001630140100000fac040100000fac040100000fac028000*00" -a 3 hashcat!
hashcat (v6.2.6-661-gf924ee801) starting
...
024022795224bffca545276c3762686f:6466b38ec3fc:225edc49b7aa:TP-LINK_HASHCAT_TEST:hashcat!
                                                          
Session..........: hashcat
Status...........: Cracked
As expected, we got the PSK.

BTW: from README.md Requirements (hcxdumptool/hcxtools)
Code:
* knowledge of radio technology
* knowledge of electromagnetic-wave engineering
* detailed knowledge of 802.11 protocol
* detailed knowledge of key derivation functions
* detailed knowledge of Linux (strict)
* detailed knowledge of filter procedures (Berkeley Packet Filter, capture filter, display filter)
If you have acquired this knowledge (feel free to ask), I'm sure, you will have a lot of fun with hcxdumptool -> hcxtools -> hashcat/JtR.
Reply


Messages In This Thread
RE: Cracking a password present in wordlist doesn't work - by ZerBea - 07-25-2023, 01:27 PM