I have captured several four-way handshake .cap files for different APs using Xiaopan minidwep-gtk. The size of these .cap files varies from 137.4kb to 2.8mb. I also tried capturing four-way handshakes .cap files for same AP on different days but the file size again do varies. Having captured a WPA four-way handshake I then proceed to selecting a password dictionary to search the key. I can see the process of checking the password dictionary and this seem to be running forever in the correct manner. It will eventually stop and displayed a message: No key found in the dictionary! I then choose to copy and save the handshake file to say one directory mnt/sdb1 for further password dictionary attack in another day. So far so good Now if I do a dictionary attack using the saved handshake file and the same dictionary the checking process seem to be completed in several seconds and then displayed the"No key found in the dictionary!" message almost instantly. I have tried several days using different saved handshake files and different dictionaries combinations. But the process of password checking end the same way within several seconds. I believe I have carried out the above processes correctly because No error messages appear. Could some expert here check this out and shed some light in this matter.
Upload any of those files (just one) let me try it against my dictionary...will let you know the outcome
Perhaps I should make this more clear and to keep this topic alive since I get no response this far. The Dictionary Attack works smoothly if after capturing a WPA four-way handshake I then proceed IMMEDIATELY to selecting a password dictionary to search the key. The checking of each password in the dictionary can be seen on screen running continuously as it should be. However if I choose to save the handshake file for later dictionary attack the checking process only last for few seconds and then displayed the"No key found in the dictionary!" message. Having tried this out for several more days I believe there is a BUG as this is not running correctly. I wish someone could take the time and trouble to verify if this is true using their pre-SAVED captured handshake file and dictionary file. Just saw your post estimacamry Try to upload a file but got error The following error occurred The uploaded file does not have an allowed extension. 00-13-D4:XX-XX-XX_handshake.cap
no prob for me to run dict against a saved cap file. you can always upload to a file sharing site and post the link here Sent from my GT-S7500 using Tapatalk 2
Can u please try these 2 files? http://www.2shared.com/file/NzjrRnvA/00-1A-70-XX-XX-XX_handshake.html http://www.2shared.com/file/TBCsBIvM/00-30-0A-XX-XX-XX_handshake.html Many thanks
My problem may be due to the fact that I have been running the Dictionary Attack by pressing the Dictionary Attack button immediately after opening minidwep. Is this the correct way? It looks like you are doing this by opening a new Console session which I am trying next. I know this is probably a dumb question. But I have yet to fully comprehend the linux file system. If staying with minidwep I open a new Console session and enter: aircrack-ng -w password.txt -b 00:14:6C:XX:XX:XX psk.cap where -w password.txt is the name of the dictionary file psk.cap is the name of file containing the captured packets. I just cannot figure out how/where to get aircrack to read/find it. I know it doesn't matter where you place the dictionary file or .cap files, as long as you point to it correctly aircrack-ng will read it. I am using a Xiaopan live USB with another USB containg all my SAVED handshake .cap files and dictionary files. I have tried using the full path to it, for example /mnt/sdc1/Phone List/0128XXXXXX.txt. but without success. Could you 1 point me to the correct way to enter full path to these files? Thanks and I fully appreciate all the help you rendered me so far.
After mounting your USB that contain the cap files and dictionary list, open up a terminal and execute aircrack-ng. Sample of command I used Code: Select All sudo aircrack-ng /mnt/sda1/<cap file> -w /mnt/sda1/<dictionary file>
Now I got it and thanks estimacamry. Just one more request. Would it be possible to remove the 2 pictures as they contain ESSID.
just censored what's necessary. the pictures might give some newbies useful ideas Sent from my GT-S7500 using Tapatalk 2
estimacamry wow!!! your speed dictionary attck so fast 900++k/s... bro that speed depend pc or network card???
reyman76 this is slow coz I'm running it in virtual machine. On liveUSB, aircrack-ng 1800k/s, with pyrit 2300k/s and with oclHashcat-plus I get 5000k/s. vampiricbunny1800 gets 11800k/s with oclHashcat-plus yet he is still complaining Depends on your pc architecture. If you have GPU then oclHashcat is definite a good choice for speed cracking
I have finally resolved my little problem of using the Dictionary Attack button in minidwep-gtk. It seems that the path /mnt/sdc1/Phone List/0128XXXXXX.txt that I used do not allow space between the two words Phone List. After I changed Phone List to Phone-List everything works correctly. That is NO more case of dictionary attack that ends within seconds with a "No key found in the dictionary!" message.