Hashcat is not cracking my own 8 digit wpa2 wifi password.
#1
Exclamation 
Hello everyone,
I am a knoob and want you guys help here, i captured 4 way handshake of my wifi through The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali). and then changed the cap file to hccapx format so that hashcat can recognize for cracking purpose, my wifi password is : 11111111. (8 ones by digit) so this should be very easy to crack for hashcat. But it reaches 100% without any luck and at last hashcat message is : exhausted. Can someone explain why ? I spent 4 days reapeating the process but no luck until now. The command i use is on hashcat 6.1 1 and hashcat.exe -m 2500 -a 3 file.hccapx ?d?d?d?d?d?d?d?d.  Please help me
Reply
#2
Hashmode 2500 and hccapx format is deprecated.
Please read this, because it may be similar to your problem:
https://hashcat.net/forum/thread-10529.html
You can use the online converter to convert your dump file to the new format:
https://hashcat.net/cap2hashcat/

Some more answers and links are here:
https://hashcat.net/forum/thread-10685.html

Please notice:
If your dump tool failed to retrieve a valid 4way handshake or a PMKID, hashcat will fail to recover the PSK.
If your conversion tool (dump file to hash file accepted by hashcat) failed to detect a valid handshake or a PMKID, hashcat will fail to recover the PSK.

BTW:
Full output of hashcat status would be helpful.
Reply
#3
(03-25-2022, 03:07 PM)ZerBea Wrote: Hashmode 2500 and hccapx format is deprecated.
Please read this, because it may be similar to your problem:
https://hashcat.net/forum/thread-10529.html
You can use the online converter to convert your dump file to the new format:
https://hashcat.net/cap2hashcat/

Some more answers and links are here:
https://hashcat.net/forum/thread-10685.html

Please notice:
If your dump tool failed to retrieve a valid 4way handshake or a PMKID, hashcat will fail to recover the PSK.
If your conversion tool (dump file to hash file accepted by hashcat) failed to detect a valid handshake or a PMKID, hashcat will fail to recover the PSK.

BTW:
Full output of hashcat status would be helpful.

Hey zerbea ! 
Thanks for the great reply and tip, i got busy today and it's already 12:00 am here now.I will check and report back tomorrow as i am going to  sleep now buddy.
Reply
#4
I recommend to take a look at the video tutorial, mentioned here:
https://hashcat.net/forum/thread-10685-p...l#pid54972
It exactly show how to recover the PSK of a TP-Link router using the new attack mode.
Reply
#5
(03-26-2022, 09:17 AM)ZerBea Wrote: I recommend to take a look at the video tutorial, mentioned here:
https://hashcat.net/forum/thread-10685-p...l#pid54972
It exactly show how to recover the PSK of a TP-Link router using the new attack mode.

Dear ZerBea,

Thank you very much for your great advise and help. After your referring to those threads, i was able to understand that how much i was outdated into those old attack modes. Well, there is a lot of stuff to read and then understand. although i am very new to wifi hacking and am thankful to you and myself that i came across here to get some professional help regarding this query and solve my problems. i will let you know in the future days if i was able to gain success through these methods and if i was stuck somewhere, for sure i will message here and get your help again. Really thanks for giving me your time and support.

Regards.
Reply
#6
Dear ZerBea,
I have gone through all the process but now i have a problem, i have cracked my own wifi password through dictionary attack, but i want to hack the default 8 digit PIN of my router which i can't, please explain how can i do that ? Which method can i use currently ? The wps attack doesn't work because the router kicks back the attack. WPS v2.0 and unlocked router.
Reply
#7
(04-07-2022, 03:39 PM)khalidhotaky Wrote: Dear ZerBea,
I have gone through all the process but now i have a problem,  i have cracked my own wifi password through dictionary attack, but i want to hack the default  8 digit PIN of my router which i can't, please explain how can i do that  ? Which method can i use currently ? The wps attack doesn't work because the router kicks back the attack. WPS v2.0 and unlocked router.

This isn't a hacking forum and WPS is not relevant to this forum anyways. WPS is basically dead today anyways, but reaver/pixiewps are the go-to tools.
Reply
#8
I fully agree on every point mentioned by soxrok2212.
Reply