03-22-2018, 11:01 PM 
		
	
	
		unlikely. the example file has been around since a long time and people have been successfully cracking WPA hashes as well.
	
	
	
	
	
| 
					-m 2500 seems to be somewhat broken
				 | 
| 
		
		
		03-22-2018, 11:01 PM 
		
	 
		unlikely. the example file has been around since a long time and people have been successfully cracking WPA hashes as well.
	 (03-22-2018, 11:01 PM)undeath Wrote: unlikely. the example file has been around since a long time and people have been successfully cracking WPA hashes as well. idk, tested on two APs (android and some noname chinese) — both had null terminator after a password. srsly, nothing would connect to them if there were something wrong with handshakes, and all my notebooks and phones connect just fine. please, check. 
		
		
		03-23-2018, 12:00 AM 
		
	 
		I received the hccapx handshakes from cab404 and was unable to reproduce the issue. Maybe something is wrong with his ocl runtime. @cab404: just to make sure, all the passwords you tried to crack were of at least length 8, correct? | 
| 
					« Next Oldest | Next Newest »
				 |