04-13-2024, 10:28 PM
I am successfully extracting pmkid files with wifi marauder, I am using -D1 to use gpu because has more allocatable mb. This is how in use hashcat. I open the folder, I type 'cmd' to open hashcat in the command prompt and command looks like this:
hashcat -D1 -m22000 filename.hc22000 hak5.txt
The filename.hc22000 file is a pmkid file I extracted and then used hashcat pmkid to hc22000 converter, the handshake extraction is successful so I save to a name that is easy and short to type, hence filename.hc22000.
Hashcat runs and everything seems to be working as it should however my results are a huge amount of numbers in a bunch of colums..I am not getting the password cracked as I am hoping. I have used one of the passwords in the hak5.txt on my own network for testing so I know the info is there and the handshake capture is successful. What am I doing wrong?
hashcat -D1 -m22000 filename.hc22000 hak5.txt
The filename.hc22000 file is a pmkid file I extracted and then used hashcat pmkid to hc22000 converter, the handshake extraction is successful so I save to a name that is easy and short to type, hence filename.hc22000.
Hashcat runs and everything seems to be working as it should however my results are a huge amount of numbers in a bunch of colums..I am not getting the password cracked as I am hoping. I have used one of the passwords in the hak5.txt on my own network for testing so I know the info is there and the handshake capture is successful. What am I doing wrong?