06-06-2021, 02:12 PM (This post was last modified: 06-06-2021, 04:26 PM by kbadjooo.)
I started testing some things on my own router. I managed to capture one valid handshake with the appropriate commands (
airmon-ng,airodumb etc.). I created a wordlist text file with my router password in it and aircrack-ng
successfully found the password. Then I converted the .cap file into .hccapx with
cap2hccapx.bin and I tried to find it with hashcat on Windows. I tried the command: hashcat.exe -m 2500 windv2.hccapx test2.txt
but hashcat couldn't find the password. It says it is exhausted but the password exists on the text file. What do you think is going wrong?
06-06-2021, 04:02 PM (This post was last modified: 06-06-2021, 04:14 PM by kbadjooo.)
(06-06-2021, 03:15 PM)slyexe Wrote: 2500 is depreciated, there are newer tools available and incorporated with hashcat. Check out hcxtools for easier and more reliable captures.
Also without knowing your hashcat version, OS, and just the cmdline status screen we could be guessing at anything.
-m 2500 you mean is deprecated or depreciated? hcxtools are for converting .cap to hccapx?
I use Hashcat 6.2.1 version with windows 10.
06-07-2021, 04:34 PM (This post was last modified: 06-07-2021, 04:40 PM by Snoopy.)
(06-06-2021, 04:02 PM)kbadjooo Wrote:
(06-06-2021, 03:15 PM)slyexe Wrote: 2500 is depreciated, there are newer tools available and incorporated with hashcat. Check out hcxtools for easier and more reliable captures.
Also without knowing your hashcat version, OS, and just the cmdline status screen we could be guessing at anything.
-m 2500 you mean is deprecated or depreciated? hcxtools are for converting .cap to hccapx?
I use Hashcat 6.2.1 version with windows 10.
see this thread, it involves a new attack vector without needind ng-dump or wlan sniffing in such way, that no other client has to be connected to the wifi