09-21-2018, 11:29 AM
Hi marcou3000.
Mem5 gave you a good advice and I recommend to follow his advice!
hashcat -m 16800 -w 3 82445.16800 -a 3 ?l?l?l?l?l?lt!
should do the job
It's also important to check your attacking/capturing procedure.
Run the attack a little bit longer (> 24h , better a week) to get all(!) clients connected to this network. Try to annoy the clients. Then check if unencrypted PSKs or parts of PSKs are inside the traffic.
1. Use this output in combination with a mask and feed hashcat.
2. Try some week password candidates.
3. Get informations about the VENDOR and discover the default key space. Run this key space as a mask
Mem5 gave you a good advice and I recommend to follow his advice!
hashcat -m 16800 -w 3 82445.16800 -a 3 ?l?l?l?l?l?lt!
should do the job
It's also important to check your attacking/capturing procedure.
Run the attack a little bit longer (> 24h , better a week) to get all(!) clients connected to this network. Try to annoy the clients. Then check if unencrypted PSKs or parts of PSKs are inside the traffic.
1. Use this output in combination with a mask and feed hashcat.
2. Try some week password candidates.
3. Get informations about the VENDOR and discover the default key space. Run this key space as a mask