Cracking WPA Password (Token length exception – no hashes loaded)
#4
(06-24-2021, 09:44 AM)Jimis 3:16 Wrote: Ok, I checked what you say. Now what I should do?
From your image it looks like mode 22000 is most probable. Check that the hash you are trying to crack starts with the same characters, WPA*01* then 32 hex characters * again etc. If your hash line is correct like in the image hashcat should load the hash line if you start it with hashcat -m 22000 hashfile <insert attack here> where hashfile is the file where the hash you are trying to crack is stored. Attack can be any attack hashcat supports. Wordlist, mask etc.

Maybe first you can try to crack the example hash and see if it works. The password for the example hash is hashcat! so it's easy to crack. For instance try to crack it with attack -a 3 ?l?l?l?l?l?l?l?s, that is 7 lowercase characters + one special. That should crack the example hash.
Reply


Messages In This Thread
RE: Cracking WPA Password (Token length exception – no hashes loaded) - by trebla - 06-24-2021, 10:43 PM