I used aircrack to capture a handshake of my network. I ran cap2hccapx to convert the file. I created a dictionary file with the password for the wifi. I ran hashcat64 -m 2500 -a 0 capture.hccapx dictionary.txt. Although I know the password is in the dictionary file, hashcat does not crack the password. I also ran a BF on the file, but it won't crack that way either.
To answer what went wrong, we must take a closer look into the cap file. Please attach the cap file (zip compressed) and, if possible, some information about the tool which did the capturing.
08-27-2019, 05:31 PM (This post was last modified: 08-27-2019, 05:35 PM by ZerBea.)
Thanks. The cap file is ok and contain a complete handshake M1, M2, M3 and 4xM4 (zeroed SNONCE). cap2hccapx converted it correct.
Additional the M1 contain a valid PMKID and you can run hashcat -m 16800 against it.
Next step is to make sure, OpenCL and/or CUDA isn't broken.
What GPU do you use? What driver is installed?
Also you can try the attached PMKID against your dictionary. Is the key recovered?
I have two AMD R9-290X installed in my system. I am using Windows 10. I do get an error that OPENCL kernel self-test failed. Since I am cracking other password hashes, I guess I ignorantly assumed it would be ok to run it anyway.
My driver version is from 7/30/19 26.20.13001.25001
You can test also hashmode -m 16800 running the wordlist against this PMKID
2582a8281bf9d4308d6f5731d0e61c61*4604ba734d4e*89acf0e761f4*ed487162465a774bfba60eb603a39f3a
Password: hashcat!
Is the password recovered, too?