What was it?
NETGEAR21:angulofamily
Could be either.
I don't know of a way to do it with hashcat, but you could always use ULM to capitalize them.
Yea, that's a big dict to run. I'd run one of the smaller ones 1st. If you look back several pages there is a link to a decent one.
https://xiaopan.co/forums/threads/wpa-wpa2-auditing-service.3739/page-186
https://xiaopan.co/forums/threads/wpa-wpa2-auditing-service.3739/page-185
I did a check kind of like this before, but for lower alpha. Same times: Lower alpha only, 12 digits: Time.Started.....: Wed Mar 03 17:39:03...
Session..........: hashcat Status...........: Exhausted Hash.Name........: WPA-EAPOL-PBKDF2 Hash.Target......: 1.hccapx Time.Started.....: Thu Mar...
ESSID: BSSID: Known Default Mask: Country Of Origin: Attempts already made: Example ESSID: My_Network BSSID: AA:AB:AC:AD:A0:A1 Known Default...
How about some kind of info on them so people are not taking a shot in the dark?
08d59d9aea96:d81265bb1c77:MySpectrumWiFi90-2G:superdeer556 08d59d9aea96:068a127efb6f:MySpectrumWiFi90-2G:superdeer556
[IMG]
You should not have submitted it to a paid service unless you were able to pay. Pretty simple concept.
Is it processing the CAP file? If so, can you turn that off?