04-10-2013, 08:14 PM
Hey hashcat users!
I tried to crack for educational purposes my own WIFI (WPA) password.
I got from The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) (Backtrack 6) a .cap file.
Because I knew the password already I was able to "crack" (proof) the password with aircrack-ng.
Then I tried to crack the the captured file with oclHashcat-plus.
To do this I converted the .cap file with the online converter of hashcat.net into a .hccap file.
But when loading this file into oclHashcat-plus and trying to crack it with the same password, it didn't found/accepted the correct password.
Can you imagine what I've done wrong?
Thank you very much!
Rabbitz
I tried to crack for educational purposes my own WIFI (WPA) password.
I got from The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) (Backtrack 6) a .cap file.
Because I knew the password already I was able to "crack" (proof) the password with aircrack-ng.
Then I tried to crack the the captured file with oclHashcat-plus.
To do this I converted the .cap file with the online converter of hashcat.net into a .hccap file.
But when loading this file into oclHashcat-plus and trying to crack it with the same password, it didn't found/accepted the correct password.
Can you imagine what I've done wrong?
Thank you very much!
Rabbitz