Posts: 195
	Threads: 7
	Joined: Jul 2015
	
	
 
	
		
		
 08-23-2015, 04:09 PM
 
		08-23-2015, 04:09 PM 
		
	 
	
		 (08-23-2015, 12:23 PM)rico Wrote:   (08-23-2015, 07:19 AM)soxrok2212 Wrote:  I converted the cap to hccap through the function on this site. Is that the problem?
I don't know much about the driver situation but I have had an issue in the past with the online cap->hccap converter. I would suggest you try: 
aircrack-ng -J outfile in.cap
Worked for me in the same situation.
Well, that worked perfectly. I was about to rip my hair out. Thanks!
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 230
	Threads: 4
	Joined: Aug 2015
	
	
 
	
	
		np. Just sprinkling a little pixie dust magic 
 
	 
 
	
	
	
		
	Posts: 195
	Threads: 7
	Joined: Jul 2015
	
	
 
	
	
		 (08-23-2015, 04:21 PM)rico Wrote:  np. Just sprinkling a little pixie dust magic 
Well, it worked for 1 handshake but not another one I have. Cleaned it all manually all EAPOL 1-4 + a beacon, aircrack recovers it and still hashcat doesn't.
Someone else cracked the same hash on a different machine so I think it may be mine...
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 230
	Threads: 4
	Joined: Aug 2015
	
	
 
	
		
		
		08-23-2015, 09:08 PM 
(This post was last modified: 08-31-2015, 11:20 PM by rico.)
		
	 
	
		 (08-23-2015, 05:05 PM)soxrok2212 Wrote:  Someone else cracked the same hash on a different machine so I think it may be mine...
If you want to PM me a link to your problematic cap or hccap file (and the password), I can test it out for you.
You might also consider testing with the CPU version of hashcat to rule in/out your driver situation.
UPDATE: Resolved. Turns out the password wasn't in his wordlist...