WPA2 - not working vs aircrack-ng?
#3
I have done a little testing...

The hccap contains exactly 1 hash, the wpa.cap contained multiple, but aircrack lets you select 1 network to export. (I selected my own)

the password is rather long. 41 characters

if I delete everything but my password the result is the same (the rejected rate is 0/1)

Code:
client1 hashcat-2.00 # ./hashcat-cli32.bin -m 2500 3.hccap.hccap common_passwords_from_hacked_websites2.txt
Initializing hashcat v2.00 with 4 threads and 32mb segment-size...

ATTENTION!
  The WPA/WPA2 key version in your .hccap file is invalid!
  This could be due to a recent aircrack-ng bug.
  The key version was automatically reset to a reasonable value.

Added hashes from file 3.hccap.hccap: 1 (1 salts)
Activating quick-digest mode for single-hash with salt

3.hccap.hccap:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

All hashes have been recovered

Input.Mode: Dict (common_passwords_from_hacked_websites2.txt)
Index.....: 1/1 (segment), 105 (words), 1276 (bytes)
Recovered.: 1/1 hashes, 1/1 salts
Speed/sec.: - plains, 101 words
Progress..: 102/105 (97.14%)
Running...: 00:00:00:01
Estimated.: --:--:--:--


Started: Thu Sep  1 14:08:02 2016
Stopped: Thu Sep  1 14:08:03 2016



Code:
client1 cudaHashcat-2.01 # ./cudaHashcat32.bin -m 2500 3.hccap.hccap common_passwords_from_hacked_websites2.txt
cudaHashcat v2.01 starting...

ATTENTION!
  The WPA/WPA2 key version in your .hccap file is invalid!
  This could be due to a recent aircrack-ng bug.
  The key version was automatically reset to a reasonable value.

Device #1: GeForce GTX 560 Ti, 1023MB, 1670Mhz, 8MCU

Hashes: 1 hashes; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Applicable Optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c
Device #1: Kernel ./kernels/4318/m02500.sm_21.32.cubin
Device #1: Kernel ./kernels/4318/amp_a0_v1.sm_21.32.cubin

Generated dictionary stats for common_passwords_from_hacked_websites2.txt: 1276 bytes, 105 words, 105 keyspace


ATTENTION!
  The wordlist or mask you are using is too small.
  Therefore, oclHashcat is unable to utilize the full parallelization power of your GPU(s).
  The cracking speed will drop.
  Workaround: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_to_create_more_work_for_full_speed


INFO: approaching final keyspace, workload adjusted


Session.Name...: cudaHashcat
Status.........: Exhausted
Input.Mode.....: File (common_passwords_from_hacked_websites2.txt)
Hash.Target....: Mikrowelle ( <-> )
Hash.Type......: WPA/WPA2
Time.Started...: 0 secs
Time.Estimated.: 0 secs
Speed.GPU.#1...:        0 H/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 105/105 (100.00%)
Rejected.......: 30/105 (28.57%)
HWMon.GPU.#1...: -1% Util, 42c Temp, 30% Fan

Started: Thu Sep  1 14:08:33 2016
Stopped: Thu Sep  1 14:08:36 2016


(09-01-2016, 04:01 PM)jodler303 Wrote: Just guessing.

1) Rejected.......: 30/100 (30.00%)  ... are you sure your password hasn't been rejected.  I'd try with a second passwordfile that ONLY has your password and see if it gets rejected or not.

2) Do you have multiple handshakes stored in that .cap file when converting it to .hccap with aircrack-ng -J ?   If yes, try isolating one handshake to another .cap and then convert that to .hccap using aircrack-ng. Have a look here: https://hashcat.net/forum/thread-5792-po...l#pid31068


Messages In This Thread
RE: WPA2 - not working vs aircrack-ng? - by bastibasti - 09-01-2016, 04:14 PM
RE: WPA2 - not working vs aircrack-ng? - by vom - 09-01-2016, 04:27 PM
RE: WPA2 - not working vs aircrack-ng? - by atom - 09-01-2016, 04:28 PM
RE: WPA2 - not working vs aircrack-ng? - by atom - 09-01-2016, 07:03 PM
RE: WPA2 - not working vs aircrack-ng? - by atom - 09-02-2016, 03:03 PM
RE: WPA2 - not working vs aircrack-ng? - by atom - 09-05-2016, 09:29 AM