03-09-2017, 07:17 PM
(03-09-2017, 07:10 PM)abdou99 Wrote:(03-09-2017, 06:50 PM)TheFool Wrote:(02-16-2017, 08:28 PM)c4p0ne Wrote: Also, I have a test AP here whose password is known. cap2hccapx extracts dosens of handshakes from my .cap files off that AP. Yet the known password isn't being cracked. I'm assuming 100% of all of those handshakes are bad. But I'm having trouble understanding how it's grabbing handshakes when the only machine connected to the AP is not re-authenticating (i'm not running any de-auth attacks, just casually sniffing).
I think there is a problem with this new tool...
Testing my own AP, I captured the handshake (using aircrack) and used a wordlist with 1 word (because I know the password).
Older version of hashcat, aircrack-ng to convert to .hccap -- success!
Hashcat 3.4, using the SAME .cap and converting it to .hccapx with cap2hccapx -- FAIL - hashcat exhausted.
.... confused.
Please upload that .cap file let me test it
http://www.bithop.net/AP.cap
The AP's password is: Password4