Ok sorry it took so long just in case it was my computer since I changed the cpu yesterday I did a clean install of Windows since Hashcat is all I use the Windows drive for it didn't cause me any personal issues except reinstalling drivers, and another copy of Hashcat. I got another pcap from the same source as the one I originally noticed this problem with same cap jut two names. One thing I did notice was brute force I was wrong as to my original post on Git I either missed it or the reinstall of everything fixed something slightly.I said it would only get it with 11 char like I said it was either me or the reinstalls fixed something slightly. I didn't include the combination attack because it works flawlessly, if you want I can send that too. I also didn't send the hybrid like I said on Git that works to but for some reason it kills the speed it's like 300 H/s. I wasn't sure how fast you wanted this so I decided instead of hours waiting for it to run two lists I would just concede it's working at least as far as cracking. I never tried that mode until yesterday but I'm sure it isn't supposed to be that slow. Or maybe it is I don't know. The command lines are now,
-m 2500 hccapx file -a 3 2W43?d?d?d?d?d?d?d?d It doesn't get it until I put in,
-m 2500 hccapx file -a 3 2W433510?d?d?d?d
Here are the screens from each I started from cracked to exhausted. It says about workload but I don't know how to increase it on brute force.
hashcat (v5.1.0) starting...
OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) HD Graphics 4000, 350/1400 MB allocatable, 16MCU
* Device #2: Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz, 5924/23699 MB allocatable, 8MCU
OpenCL Platform #2: Advanced Micro Devices, Inc.
================================================
* Device #3: Baffin, 3264/4096 MB allocatable, 16MCU
Hashes: 5 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Applicable optimizers:
* Zero-Byte
* Single-Salt
* Brute-Force
* Slow-Hash-SIMD-LOOP
Minimum password length supported by kernel: 8
Maximum password length supported by kernel: 63
Watchdog: Temperature abort trigger set to 90c
The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see:
https://hashcat.net/faq/morework
Approaching final keyspace - workload adjusted.
7c784988aa54255f8387c37116e7d8c0:78d294ec4021:34de1a902b5d:ARRIS-9DAB:2W4335101732
609747974004468e1217971431e703fb:78d294ec4021:200db0181726:ARRIS-9DAB:2W4335101732
6474e67906246efd3d971737f245a58a:78d294ec4021:34de1a902b5d:ARRIS-9DAB:2W4335101732
Session..........: 2019-11-15
Status...........: Cracked
Hash.Type........: WPA-EAPOL-PBKDF2
Hash.Target......: C:\Users\robert\OneDrive\Desktop\hashcat-5.1.0\ARRIS-9.hccapx
Time.Started.....: Fri Nov 15 17:04:35 2019 (3 secs)
Time.Estimated...: Fri Nov 15 17:04:38 2019 (0 secs)
Guess.Mask.......: 2W433510?d?d?d?d [12]
Guess.Charset....: -1 ?d, -2 Undefined, -3 Undefined, -4 Undefined
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 3095 H/s (9.86ms) @ Accel:32 Loops:16 Thr:512 Vec:1
Speed.#2.........: 2058 H/s (0.74ms) @ Accel:1024 Loops:1024 Thr:1 Vec:4
Speed.#3.........: 22762 H/s (1.52ms) @ Accel:256 Loops:128 Thr:256 Vec:1
Speed.#*.........: 27916 H/s
Recovered........: 3/3 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.........: 10000/10000 (100.00%)
Rejected.........: 0/10000 (0.00%)
Restore.Point....: 0/10000 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:2-5
Restore.Sub.#2...: Salt:0 Amplifier:0-1 Iteration:2-5
Restore.Sub.#3...: Salt:0 Amplifier:0-1 Iteration:2-5
Candidates.#1....: 2W4335100000 -> 2W4335101774
Candidates.#2....: 2W4335107303 -> 2W4335104984
Candidates.#3....: 2W4335100074 -> 2W4335104964
Hardware.Mon.#1..: N/A
Hardware.Mon.#2..: N/A
Hardware.Mon.#3..: Util: 0% Core: 214MHz Mem:1750MHz Bus:8
Started: Fri Nov 15 17:04:27 2019
Stopped: Fri Nov 15 17:04:39 2019
C:\Users\robert\OneDrive\Desktop\hashcat-5.1.0>2W433510173?d
hashcat (v5.1.0) starting...
OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz, 5924/23699 MB allocatable, 8MCU
* Device #2: Intel(R) HD Graphics 4000, 350/1400 MB allocatable, 16MCU
OpenCL Platform #2: Advanced Micro Devices, Inc.
================================================
* Device #3: Baffin, 3264/4096 MB allocatable, 16MCU
Hashes: 5 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Applicable optimizers:
* Zero-Byte
* Single-Salt
* Brute-Force
* Slow-Hash-SIMD-LOOP
Minimum password length supported by kernel: 8
Maximum password length supported by kernel: 63
Watchdog: Temperature abort trigger set to 90c
The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see:
https://hashcat.net/faq/morework
Approaching final keyspace - workload adjusted.
Cracking performance lower than expected?
* Create more work items to make use of your parallelization power:
https://hashcat.net/faq/morework
7c784988aa54255f8387c37116e7d8c0:78d294ec4021:34de1a902b5d:ARRIS-9DAB:2W4335101732
609747974004468e1217971431e703fb:78d294ec4021:200db0181726:ARRIS-9DAB:2W4335101732
6474e67906246efd3d971737f245a58a:78d294ec4021:34de1a902b5d:ARRIS-9DAB:2W4335101732
Session..........: 2019-11-15
Status...........: Cracked
Hash.Type........: WPA-EAPOL-PBKDF2
Hash.Target......: C:\Users\robert\OneDrive\Desktop\hashcat-5.1.0\ARRIS-9.hccapx
Time.Started.....: Fri Nov 15 17:05:02 2019 (20 secs)
Time.Estimated...: Fri Nov 15 17:05:22 2019 (0 secs)
Guess.Mask.......: 2W43351?d?d?d?d?d [12]
Guess.Charset....: -1 ?d, -2 Undefined, -3 Undefined, -4 Undefined
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 4947 H/s (3.04ms) @ Accel:1024 Loops:1024 Thr:1 Vec:4
Speed.#2.........: 3239 H/s (79.26ms) @ Accel:32 Loops:16 Thr:512 Vec:1
Speed.#3.........: 68371 H/s (14.29ms) @ Accel:256 Loops:128 Thr:256 Vec:1
Speed.#*.........: 76557 H/s
Recovered........: 3/3 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.........: 100000/100000 (100.00%)
Rejected.........: 0/100000 (0.00%)
Restore.Point....: 0/100000 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:2-5
Restore.Sub.#2...: Salt:0 Amplifier:0-1 Iteration:2-5
Restore.Sub.#3...: Salt:0 Amplifier:0-1 Iteration:2-5
Candidates.#1....: 2W4335123456 -> 2W4335147789
Candidates.#2....: 2W4335153456 -> 2W4335174759
Candidates.#3....: 2W4335129547 -> 2W4335173838
Hardware.Mon.#1..: N/A
Hardware.Mon.#2..: N/A
Hardware.Mon.#3..: Util: 0% Core: 214MHz Mem: 625MHz Bus:8
Started: Fri Nov 15 17:04:54 2019
Stopped: Fri Nov 15 17:05:24 2019
C:\Users\robert\OneDrive\Desktop\hashcat-5.1.0>
hashcat (v5.1.0) starting...
OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) HD Graphics 4000, 350/1400 MB allocatable, 16MCU
* Device #2: Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz, 5924/23699 MB allocatable, 8MCU
OpenCL Platform #2: Advanced Micro Devices, Inc.
================================================
* Device #3: Baffin, 3264/4096 MB allocatable, 16MCU
Hashes: 5 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Applicable optimizers:
* Zero-Byte
* Single-Salt
* Brute-Force
* Slow-Hash-SIMD-LOOP
Minimum password length supported by kernel: 8
Maximum password length supported by kernel: 63
Watchdog: Temperature abort trigger set to 90c
The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see:
https://hashcat.net/faq/morework
Approaching final keyspace - workload adjusted.
Session..........: 2019-11-15
Status...........: Exhausted
Hash.Type........: WPA-EAPOL-PBKDF2
Hash.Target......: C:\Users\robert\OneDrive\Desktop\hashcat-5.1.0\ARRIS-9.hccapx
Time.Started.....: Fri Nov 15 17:05:44 2019 (1 min, 21 secs)
Time.Estimated...: Fri Nov 15 17:07:05 2019 (0 secs)
Guess.Mask.......: 2W4335?d?d?d?d?d?d [12]
Guess.Charset....: -1 ?d, -2 Undefined, -3 Undefined, -4 Undefined
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 3255 H/s (310.45ms) @ Accel:32 Loops:16 Thr:512 Vec:1
Speed.#2.........: 6551 H/s (24.13ms) @ Accel:1024 Loops:1024 Thr:1 Vec:4
Speed.#3.........: 67749 H/s (90.86ms) @ Accel:256 Loops:128 Thr:256 Vec:1
Speed.#*.........: 77554 H/s
Recovered........: 0/3 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 1000000/1000000 (100.00%)
Rejected.........: 0/1000000 (0.00%)
Restore.Point....: 262795/1000000 (26.28%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:2-5
Restore.Sub.#2...: Salt:0 Amplifier:0-1 Iteration:2-5
Restore.Sub.#3...: Salt:0 Amplifier:0-1 Iteration:2-5
Candidates.#1....: 2W4335365699 -> 2W4335095021
Candidates.#2....: 2W4335466049 -> 2W4335448738
Candidates.#3....: 2W4335874297 -> 2W4335737373
Hardware.Mon.#1..: N/A
Hardware.Mon.#2..: N/A
Hardware.Mon.#3..: Util: 0% Core: 214MHz Mem: 625MHz Bus:8
Started: Fri Nov 15 17:05:37 2019
Stopped: Fri Nov 15 17:07:06 2019
C:\Users\robert\OneDrive\Desktop\hashcat-5.1.0>
Then for straight and there is going to be a bit more here I'm going to paste in the space where the password is placed on both rockyou so you can place yours exactly as I placed mine.
-m 2500 -a 0 capfile rockyou1 then rockyou2
I'll put the two screens first then the two with their position in the list last in rockyou and I'm figuring you can download the same one as me I guess just search the candidate before the password and insert it there.
hashcat (v5.1.0) starting...
OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) HD Graphics 4000, 350/1400 MB allocatable, 16MCU
* Device #2: Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz, 5924/23699 MB allocatable, 8MCU
OpenCL Platform #2: Advanced Micro Devices, Inc.
================================================
* Device #3: Baffin, 3264/4096 MB allocatable, 16MCU
Hashes: 5 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Applicable optimizers:
* Zero-Byte
* Single-Salt
* Slow-Hash-SIMD-LOOP
Minimum password length supported by kernel: 8
Maximum password length supported by kernel: 63
Watchdog: Temperature abort trigger set to 90c
Dictionary cache hit:
* Filename..: C:\Users\robert\OneDrive\Desktop\hashcat-5.1.0\Wordlists\rock1.txt
* Passwords.: 14344385
* Bytes.....: 139921510
* Keyspace..: 14344385
7c784988aa54255f8387c37116e7d8c0:78d294ec4021:34de1a902b5d:ARRIS-9DAB:2W4335101732
609747974004468e1217971431e703fb:78d294ec4021:200db0181726:ARRIS-9DAB:2W4335101732
6474e67906246efd3d971737f245a58a:78d294ec4021:34de1a902b5d:ARRIS-9DAB:2W4335101732
Session..........: 2019-11-15
Status...........: Cracked
Hash.Type........: WPA-EAPOL-PBKDF2
Hash.Target......: C:\Users\rober\OneDrive\Desktop\hashcat-5.1.0\ARRIS-9.hccapx
Time.Started.....: Fri Nov 15 16:51:17 2019 (1 sec)
Time.Estimated...: Fri Nov 15 16:51:18 2019 (0 secs)
Guess.Base.......: File (C:\Users\rober\OneDrive\Desktop\hashcat-5.1.0\Wordlists\rock1.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 2352 H/s (310.50ms) @ Accel:128 Loops:32 Thr:64 Vec:1
Speed.#2.........: 6539 H/s (305.36ms) @ Accel:1024 Loops:1024 Thr:1 Vec:4
Speed.#3.........: 42538 H/s (418.28ms) @ Accel:512 Loops:256 Thr:64 Vec:1
Speed.#*.........: 51429 H/s
Recovered........: 3/3 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.........: 697939/14344385 (4.87%)
Rejected.........: 689747/697939 (98.83%)
Restore.Point....: 0/14344385 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-3
Restore.Sub.#2...: Salt:0 Amplifier:0-1 Iteration:2-5
Restore.Sub.#3...: Salt:0 Amplifier:0-1 Iteration:0-3
Candidates.#1....: killkill -> yamjos143
Candidates.#2....: 123456789 -> ladygirl
Candidates.#3....: smileyfaces -> redhot28
Hardware.Mon.#1..: N/A
Hardware.Mon.#2..: N/A
Hardware.Mon.#3..: Util: 6% Core:1121MHz Mem:1750MHz Bus:8
Started: Fri Nov 15 16:51:09 2019
Stopped: Fri Nov 15 16:51:20 2019
C:\Users\robert\OneDrive\Desktop\hashcat-5.1.0>
hashcat (v5.1.0) starting...
OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: Intel(R) HD Graphics 4000, 350/1400 MB allocatable, 16MCU
* Device #2: Intel(R) Core(TM) i7-3770 CPU @ 3.40GHz, 5924/23699 MB allocatable, 8MCU
OpenCL Platform #2: Advanced Micro Devices, Inc.
================================================
* Device #3: Baffin, 3264/4096 MB allocatable, 16MCU
Hashes: 5 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Applicable optimizers:
* Zero-Byte
* Single-Salt
* Slow-Hash-SIMD-LOOP
Minimum password length supported by kernel: 8
Maximum password length supported by kernel: 63
Watchdog: Temperature abort trigger set to 90c
Dictionary cache hit:
* Filename..: C:\Users\robert\OneDrive\Desktop\hashcat-5.1.0\rockyou2.txt
* Passwords.: 14344385
* Bytes.....: 139921510
* Keyspace..: 14344385
Approaching final keyspace - workload adjusted.
Session..........: 2019-11-15
Status...........: Exhausted
Hash.Type........: WPA-EAPOL-PBKDF2
Hash.Target......: C:\Users\robert\OneDrive\Desktop\hashcat-5.1.0\ARRIS-9.hccapx
Time.Started.....: Fri Nov 15 16:51:40 2019 (2 mins, 15 secs)
Time.Estimated...: Fri Nov 15 16:53:55 2019 (0 secs)
Guess.Base.......: File (C:\Users\robert\OneDrive\Desktop\hashcat-5.1.0\rockyou2.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 3139 H/s (71.18ms) @ Accel:128 Loops:32 Thr:64 Vec:1
Speed.#2.........: 6358 H/s (20.96ms) @ Accel:1024 Loops:1024 Thr:1 Vec:4
Speed.#3.........: 66169 H/s (418.64ms) @ Accel:512 Loops:256 Thr:64 Vec:1
Speed.#*.........: 75665 H/s
Recovered........: 0/3 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 14344385/14344385 (100.00%)
Rejected.........: 4734913/14344385 (33.01%)
Restore.Point....: 14255016/14344385 (99.38%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:2-5
Restore.Sub.#2...: Salt:0 Amplifier:0-1 Iteration:2-5
Restore.Sub.#3...: Salt:0 Amplifier:0-1 Iteration:2-5
Candidates.#1....: $HEX[2a4462313539373534] -> $HEX[042a0337c2a156616d6f732103]
Candidates.#2....: *M15su50pH1e* -> *Dd1l7sdD*
Candidates.#3....: 0866625610 -> 01/11/1984
Hardware.Mon.#1..: N/A
Hardware.Mon.#2..: N/A
Hardware.Mon.#3..: Util: 22% Core: 214MHz Mem:1750MHz Bus:8
Started: Fri Nov 15 16:51:33 2019
Stopped: Fri Nov 15 16:53:57 2019
C:\Users\robert\OneDrive\Desktop\hashcat-5.1.0>
rockyou1
123321
123abc
mahalkita
batman
september
december
morgan
mariposa
maria
gabriela
iloveyou2
bailey
jeremy
pamela
kimberly
gemini
shannon
pictures
asshole
sophie
jessie
hellokitty
claudia
babygirl1
angelica
austin
mahalko
victor
horses
tiffany
mariana
eduardo
andres
2W4335101732 The password is here.
courtney
booboo
kissme
harley
ronaldo
iloveyou1
precious
october
inuyasha
peaches
veronica
chris
888888
adriana
cutie
james
banana
prince
friend
jesus1
crystal
celtic
zxcvbnm
edward
oliver
diana
samsung
freedom
angelo
kenneth
rockyou2
l8121989e
l81205m
l812002
l811983
l8116238
l81148910
l81127394
l8112123
l8111989
l81088
l8107132
l810500
l80rrn
l80pee
l80gators
l809lpf
l8099793208
l8099580772
l80947
l8091792
l80804
l8071608
l806500
l806018
l80548008
l8042001
l80364
l803012
l802tpx
l802327j
l801ans
l801484196l
2W4335101732 Password is here.
I'm going to try attaching the hccapx two of them both the same one just two different names if you want more I can send more but the cracked ones all do the same. I havent created any hashes but I can or I can send the other two cracked that I have. I know you have seen the password but to make it easy here it is again 2W4335101732. I attached the files but I dont know if it worked let me know and if it didn't work just tell me how I screwed it up and I'll send it the correct way and by the way I didn't see you sent me a Git issue number thank you very much. You have a good night hope to hear from you soon, anything else you need just let me know.