Posts: 11
Threads: 4
Joined: Aug 2018
Ok so I figured it out thanks for the help but whoa didn't expect it too take this long:
Next Big Bang (426392 years)
i ran it as:
hashcat -m 22000 -a3 hash.hccapx ?l?l?l?l?l?l?l?l?l?l?l?l
running on nvidia geforce gt 710
is it just my card? Or is that so complicated of a hash that it is too complex???
Posts: 1,044
Threads: 2
Joined: Jun 2017
It is both. The GT710 is a way too small and the mask too big.
You can try to attack the CLIENTs. Maybe one of them will transmit the PSK in the clear.
BTW:
It is not a good idea to give the hc22000 the same suffix as a binary hccapx file.
If you merge your old hccapx files with hc22000 files it will lead to a separator unmatched error., because they are totally different.
Posts: 1,044
Threads: 2
Joined: Jun 2017
10-08-2021, 12:24 PM
(This post was last modified: 10-09-2021, 09:36 AM by ZerBea.)
Hashcat association attack is working on 22000, too (experimental):
Code:
$ cat hashfile.22000 | awk 'BEGIN { FS = "*" } ; {print "$HEX[" $6 "]" }' > essid.list
$ hashcat -m 22000 -o found.list hashfile.22000 essid.list -a 9
or in combination with rules:
$ hashcat -m 22000 -o found.list -r best64.rule hashfile.22000 essid.list -a 9
Posts: 46
Threads: 1
Joined: Apr 2018
10-09-2021, 03:39 PM
(This post was last modified: 10-09-2021, 03:43 PM by CUwindows00.)
Hello, ZerBea
Code:
cap2hccapx.exe *.cap *.hccapx
I found that using the v1.9 cap2hccapx.exe conversion tool, the converted handshake data still has duplicates, and some handshake data have a lot of duplicates.
Can use command parameters to filter out repeated algorithm handshakes ?
Or plan to update the version of cap2hccapx.exe to add the deduplication handshake algorithm? Think it is necessary
hope can make it more perfect !
Posts: 1,044
Threads: 2
Joined: Jun 2017
10-09-2021, 04:16 PM
(This post was last modified: 10-10-2021, 07:58 AM by ZerBea.)
I can't answer this question, because I'm not the developer of hashcat-utils, to which cap2hccapx belongs.
For me, the ancient binary format hccapx/hccap with all its disadvantages is dead. There will be no more hccapx/hccap related updates or improvements of hcxtools, because the effort to handle PMKIDs and EAPOL MESSAGEPAIRs from different hash files is far too much.
BTW:
If you need a more portable and Windows friendly version of a converter:
https://github.com/s77rt/multicapconverter
Posts: 46
Threads: 1
Joined: Apr 2018
Hello,ZerBea
Hope to support windows hc22000 conversion tool
Posts: 1,044
Threads: 2
Joined: Jun 2017
10-10-2021, 08:00 AM
(This post was last modified: 10-10-2021, 08:56 AM by ZerBea.)
Posts: 3
Threads: 0
Joined: Oct 2021
Thanks Bring us very good tools
Posts: 22
Threads: 1
Joined: Sep 2017
(10-10-2021, 08:00 AM)ZerBea Wrote: As I mentioned before:
https://github.com/s77rt/multicapconverter
or online converter
https://hashcat.net/cap2hashcat/
Both of them are Windows and macOS friendly.
Work on hc22000 (ASCII txt) files can be done completely by shell tools, e.g.:
https://docs.microsoft.com/en-us/windows...mands/sort
https://stackoverflow.com/questions/2907...tch-script
Hey ZB, I have Windows compiled set of your tools (v6.1.3). If you don't mind I can share it with Windows folks. I also have multicapconverter.py compiled to executable - need s77rt's permission to post
Posts: 1,044
Threads: 2
Joined: Jun 2017
Hi oyaz.
That sounds great. hcxtools are completely open source and your Windows port is much appreciated.
I think, Windows users will appreciate your work.
BTW:
Please update to latest git head because of a buffer overflow in v6.1.x