Brute forcing WPA2 becoming impossible?
#6
(03-12-2024, 10:10 AM)ZerBea Wrote: That probably won't work as expected:
Code:
$ hcxpcapngtool -E wordlist WILLY.cap -o WILLY.hc22000

To get full benefit of hcxpcapngtool it is mandatory to run an interactive tool (like hcxdumptool/hcxlabtool or AngryOxide)  to retrieve as much as possible information from the target (in particular from a weak CLIENT).

OK, I didn't get any more error messages, I thought it was correct. How do I have to do it right? I collected the data with airodump-ng and it is now in the WILLY.cap file.
what do I have to do now?
Reply


Messages In This Thread
RE: Brute forcing WPA2 becoming impossible? - by micneu - 03-12-2024, 05:29 PM