root@kali:~# cap2hccapx '/root/Downloads/TP-LINK_C6 (D4-6E-0E-8B-C6-DA).cap' TP-LINK_C6.hccapx Zero value timestamps detected in file: /root/Downloads/TP-LINK_C6 (D4-6E-0E-8B-C6-DA).cap. This prevents correct EAPOL-Key timeout calculation. Do not use preprocess the capture file with tools such as wpaclean. --- Double Post Merged, 22 Nov 2018, Original Post Date: 22 Nov 2018 --- Crack the pin with reaver- to run 12x ?H will take my rig 50 yrs.
Thanks. I'm thinking about opening a hash/wpa cracking website and charge a small fee per dictionary. Who's with me??
p2.16xlarge.. haha yeah, it might me more time than its worth though. what is that over a 100TB file?
I only use aircrack for the interface, so when I have guests I can look cooler than that boring hashcat runtime.
Stop cleaning the caps root@kali:~# cap2hccapx '/root/Downloads/Helenacruz27.cap' Helenacruz27.hccapxZero value timestamps detected in file: /root/Downloads/Helenacruz27.cap. This prevents correct EAPOL-Key timeout calculation. Do not use preprocess the capture file with tools such as wpaclean.
root@kali:~# cap2hccapx '/root/Helenacruz27.cap' '/root/Helenacruz27.hccaxpx' Zero value timestamps detected in file: /root/Helenacruz27.cap. This prevents correct EAPOL-Key timeout calculation. Do not use preprocess the capture file with tools such as wpaclean. root@kali:~# cap2hccapx '/root/Mastil.cap' '/root/Mastil.hccapx' Zero value timestamps detected in file: /root/Mastil.cap. This prevents correct EAPOL-Key timeout calculation. Do not use preprocess the capture file with tools such as wpaclean. root@kali:~# cap2hccapx '/root/Lacroix.cap' '/root/Lacroix.hccapx' Zero value timestamps detected in file: /root/Lacroix.cap. This prevents correct EAPOL-Key timeout calculation. Do not use preprocess the capture file with tools such as wpaclean. As stated multiple times in this forum, use reaver or aircrack. None of these are valid handshakes.
They are valid handshakes if they have m1 and m2, its just that they can not be converted to hccapx for hashcat. They can still be cracked with aircrack. But too slow for my liking.
I captured a valid handshakes and also converted them to hccapx and went successful I hope you can crack them and thanks for your efforts
Can someone check this out for me, thanks. Country: Malaysia SSID: Limfamily BSSID: 7C:8B:CA:33:FF:CB ISP: Unifi Tested: 8-10 numeric