01-14-2020, 08:52 PM
Ah you’re retired, I wondered how you were working on hcxtools so quickly.
As I am stuck with old formats I have always been concerned any capture I have may be unbreakable due to error/corruption and not password strength.
I understand all hcxtools are unlikely to produce an uncrackable hash which is due to error. Are we allowed to know how you do this? Is there a pdf or something explaining it?
As part of my learning I would like to look through a capture with wireshark and see if I can manually fix broken caps.
Also is there a gradient of good - excellent within hcxtools of the likely-hood of the hash being crackable? What I am trying to ask is if there are several text hashes (new format) within the output for the same AP - Client is there a way for the user to pick the best option?
Thanks
As I am stuck with old formats I have always been concerned any capture I have may be unbreakable due to error/corruption and not password strength.
I understand all hcxtools are unlikely to produce an uncrackable hash which is due to error. Are we allowed to know how you do this? Is there a pdf or something explaining it?
As part of my learning I would like to look through a capture with wireshark and see if I can manually fix broken caps.
Also is there a gradient of good - excellent within hcxtools of the likely-hood of the hash being crackable? What I am trying to ask is if there are several text hashes (new format) within the output for the same AP - Client is there a way for the user to pick the best option?
Thanks