Cracking WPA Password (Token length exception – no hashes loaded)
#3
(06-24-2021, 09:27 AM)trebla Wrote:
(06-24-2021, 09:15 AM)Jimis 3:16 Wrote: Make sure to use the latest version of hashcat as an initial step. 
Code: hashcat -m %mode% -i --increment-min 8 --increment-max 16 -a 3 -o output.txt %hash% ?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a 
WPA being a slower hashrate will not be feasible with such a large keyspace after 12 characters unless you have some serious hardware. Also note, you specify using symbols in your initial statement but do not include it within crunch. If you are not using symbols modify your mask by using a custom character set with -1 and limit to ?l?u?d. 
Code: hashcat -m %mode% -1 ?l?u?d -i --increment-min 8 --increment-max 16 -a 3 -o output.txt %hash% ?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1

By typing either one, It says error no hashes loaded(while I've placed the hash path), can you help??

Run: hashcat --example-hashes
and check the output for WPA modes. It looks like it's either 22000 or 22001. Look at the Example.Hash line for each mode, are your hash lines formatted correctly?

Ok, I checked what you say. Now what I should do?


Attached Files
.jpg   Στιγμιότυπο οθόνης 2021-06-24 103838.jpg (Size: 67.51 KB / Downloads: 9)
Reply


Messages In This Thread
RE: Cracking WPA Password (Token length exception – no hashes loaded) - by Jimis 3:16 - 06-24-2021, 09:44 AM