03-22-2018, 11:01 PM
unlikely. the example file has been around since a long time and people have been successfully cracking WPA hashes as well.
-m 2500 seems to be somewhat broken
|
03-22-2018, 11:01 PM
unlikely. the example file has been around since a long time and people have been successfully cracking WPA hashes as well.
(03-22-2018, 11:01 PM)undeath Wrote: unlikely. the example file has been around since a long time and people have been successfully cracking WPA hashes as well. idk, tested on two APs (android and some noname chinese) — both had null terminator after a password. srsly, nothing would connect to them if there were something wrong with handshakes, and all my notebooks and phones connect just fine. please, check.
03-23-2018, 12:00 AM
I received the hccapx handshakes from cab404 and was unable to reproduce the issue. Maybe something is wrong with his ocl runtime.
@cab404: just to make sure, all the passwords you tried to crack were of at least length 8, correct? |
« Next Oldest | Next Newest »
|