Ahhh. I see. Thanks! Sorry for the noob question. What is the command to do that in hashcat? Would it be, hashcat -m 2500 wpacrack.hccap passwords.txt ?d?d?d
Its okay! I'm learning as I go too. The command I'm currently using is: hashcat -m 2500 -a 6 WPAhandshake.hccapx NetgearKiller.dict ?d?d?d for a netgear router
Thanks for the quick response, I'm curious why your file is .hccapx and mine is .hccap? I used aircrack-ng wpa.cap -J wpacrack and it gave me a .hccap file not a .hccapx file, Is there a different command to change your .cap file to .hccapx instead? When I run, hashcat -m 2500 -a 6 wpacrack.hccap passwords.txt ?d?d?d I get, zsh: no matches found: ?d?d?d Also, is NetgearKiller.dict included in pskracker or is that a different file that you created? Thanks again for the help.
I believe older versions of hashcat use .hccap. It works the same. I'm not sure about hascat not returning anything try hascat --help to make sure you're attacking right. # | Mode ===+====== 0 | Straight 1 | Combination 3 | Brute-force 6 | Hybrid Wordlist + Mask 7 | Hybrid Mask + Wordlist The NetgearKiller.dict is in this forum, if you scroll all the way up click download now. But its a large file, you'll have to VM if you want to crack it quickly.
Word. I'm using hashcat version 4.2.1 in a Kali linux VM Not sure why I keep getting the no matches found: ?d?d?d ➜ hashcat -m 2500 -a 6 wpacrack.hccap netgear.txt ?d?d?d zsh: no matches found: ?d?d?d But I really appreciate the Help! I scrolled all the way up and clicked download now but it takes me to the same github repository, https://github.com/soxrok2212/PSKracker/tree/master/dicts/netgear Which I already downloaded. I don't see NetgearKiller.dict in there. Is this the link that you were referencing or is it a different link? Can you post the link for NetgearKiller.dict? Thanks again and sorry for all the questions. I'm learning as I go as well.
Thanks. I figured it out after running the netgear.txt in this post, but the netgearkiller.dict didnt have it. Weird.
I Figured it out finally!!! LOL. Because I'm using zsh in my terminal, zsh intereprets ?d?d?d as globbing characters and tries to match it against local files. Solution is wrapping the ?d?d?d in quotes. So if your using zsh, command is, hashcat -m 2500 -a 6 FileName.hccapx NetgearKiller.dict "?d?d?d"
Guys you can also run hashcat from windows through command prompt if you are having issues with VM or if the machine your using Kali on is a slower machine ( my instance) . The command i use on windows: hashcat64.exe -m 16800 output.txt -a 6 -w 3 netgearkiller.dict ?d?d?d <<<<<<< This is for a PMKID notice the 16800 - you must have newer hashcat for this hashcat64.exe -m 2500 output.hccapx -a 6 -w 3 netgearkiller.dict ?d?d?d <<<<<< This is for a 4 way handshake hccapx old style If you want to try PMKID method i found wifibroot is the easiest to get the PMKID hash
Can anyone assist with this one? Tried to use one of the Netgear wordlists with hashcat and added the ?d?d?d modifier but no luck.
The cap needs to be converted to hccapx file format hashcat -m 2500 -w 4 --status mycapture.hccapx netgear.txt -a 6 ?d?d?d caps can be converted here - https://hashc.co.uk/cap2hccapx
Thankyou longshanks for your list earlier. Appreciated. Got piano after seeing Netgear router photos posted on ebay!
f6f007f6aee74fe736886d15dfe6b023:58904346ad1c:000c43174182:MySpectrumWiFi16-2G:bluebook287 Session..........: hashcat Status...........: Cracked Hash.Type........: WPA-EAPOL-PBKDF2 Hash.Target......: MySpectrumWiFi16-2G (AP:58:90:43:46:ad:1c STA:00:0c:43:17:41:82)