Posts: 4
Threads: 1
Joined: Mar 2022
03-25-2022, 02:08 PM
(This post was last modified: 03-25-2022, 02:11 PM by khalidhotaky.)
Hello everyone,
I am a knoob and want you guys help here, i captured 4 way handshake of my wifi through The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali). and then changed the cap file to hccapx format so that hashcat can recognize for cracking purpose, my wifi password is : 11111111. (8 ones by digit) so this should be very easy to crack for hashcat. But it reaches 100% without any luck and at last hashcat message is : exhausted. Can someone explain why ? I spent 4 days reapeating the process but no luck until now. The command i use is on hashcat 6.1 1 and hashcat.exe -m 2500 -a 3 file.hccapx ?d?d?d?d?d?d?d?d. Please help me
Posts: 1,044
Threads: 2
Joined: Jun 2017
03-25-2022, 03:07 PM
(This post was last modified: 03-25-2022, 04:52 PM by ZerBea.)
Hashmode 2500 and hccapx format is deprecated.
Please read this, because it may be similar to your problem:
https://hashcat.net/forum/thread-10529.html
You can use the online converter to convert your dump file to the new format:
https://hashcat.net/cap2hashcat/
Some more answers and links are here:
https://hashcat.net/forum/thread-10685.html
Please notice:
If your dump tool failed to retrieve a valid 4way handshake or a PMKID, hashcat will fail to recover the PSK.
If your conversion tool (dump file to hash file accepted by hashcat) failed to detect a valid handshake or a PMKID, hashcat will fail to recover the PSK.
BTW:
Full output of hashcat status would be helpful.
Posts: 4
Threads: 1
Joined: Mar 2022
(03-25-2022, 03:07 PM)ZerBea Wrote: Hashmode 2500 and hccapx format is deprecated.
Please read this, because it may be similar to your problem:
https://hashcat.net/forum/thread-10529.html
You can use the online converter to convert your dump file to the new format:
https://hashcat.net/cap2hashcat/
Some more answers and links are here:
https://hashcat.net/forum/thread-10685.html
Please notice:
If your dump tool failed to retrieve a valid 4way handshake or a PMKID, hashcat will fail to recover the PSK.
If your conversion tool (dump file to hash file accepted by hashcat) failed to detect a valid handshake or a PMKID, hashcat will fail to recover the PSK.
BTW:
Full output of hashcat status would be helpful.
Hey zerbea !
Thanks for the great reply and tip, i got busy today and it's already 12:00 am here now.I will check and report back tomorrow as i am going to sleep now buddy.
Posts: 1,044
Threads: 2
Joined: Jun 2017
I recommend to take a look at the video tutorial, mentioned here:
https://hashcat.net/forum/thread-10685-p...l#pid54972
It exactly show how to recover the PSK of a TP-Link router using the new attack mode.
Posts: 4
Threads: 1
Joined: Mar 2022
(03-26-2022, 09:17 AM)ZerBea Wrote: I recommend to take a look at the video tutorial, mentioned here:
https://hashcat.net/forum/thread-10685-p...l#pid54972
It exactly show how to recover the PSK of a TP-Link router using the new attack mode.
Dear ZerBea,
Thank you very much for your great advise and help. After your referring to those threads, i was able to understand that how much i was outdated into those old attack modes. Well, there is a lot of stuff to read and then understand. although i am very new to wifi hacking and am thankful to you and myself that i came across here to get some professional help regarding this query and solve my problems. i will let you know in the future days if i was able to gain success through these methods and if i was stuck somewhere, for sure i will message here and get your help again. Really thanks for giving me your time and support.
Regards.
Posts: 4
Threads: 1
Joined: Mar 2022
Dear ZerBea,
I have gone through all the process but now i have a problem, i have cracked my own wifi password through dictionary attack, but i want to hack the default 8 digit PIN of my router which i can't, please explain how can i do that ? Which method can i use currently ? The wps attack doesn't work because the router kicks back the attack. WPS v2.0 and unlocked router.
Posts: 194
Threads: 7
Joined: Jul 2015
(04-07-2022, 03:39 PM)khalidhotaky Wrote: Dear ZerBea,
I have gone through all the process but now i have a problem, i have cracked my own wifi password through dictionary attack, but i want to hack the default 8 digit PIN of my router which i can't, please explain how can i do that ? Which method can i use currently ? The wps attack doesn't work because the router kicks back the attack. WPS v2.0 and unlocked router.
This isn't a hacking forum and WPS is not relevant to this forum anyways. WPS is basically dead today anyways, but reaver/pixiewps are the go-to tools.
Posts: 1,044
Threads: 2
Joined: Jun 2017
I fully agree on every point mentioned by soxrok2212.