Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Known WPA2 hash cannot be found
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
I have been looking all over for the best way to crack a WPA2 hash. I have tried aircrack, but that doesn't have GPU acceleration, I have tried pyrit (which is great) but that doesn't run on windows, then I came across hashcat and I have great hope for it, but for some reason it cannot find a known key out of a WPA2 hash.

I got the hash from the Wireshark website: https://wiki.wireshark.org/SampleCaptures -> Induction.pcap sample

I then conformed it to .hccap and also made a sample password list including the password: [ Induction ].

When I ran it through hashcat-plus, it ran fine, but came up with 0/6 rejected and nothing found.

I know many people come on here complaining about known hashes not working and this is due to the password being under 8 or over 15 characters (I've done my research). But I have no explanation for this.

I tried it in aircrack and it got it successfully which is the part that's so confusing. Is the original .pcap file invalid for hashcat, am I doing something else correctly. Help would be appreciated. Smile
hashcat has its own cap format:: .hccap
use this online-converter:: https://hashcat.net/cap2hccap/
just cracked it ; )
Code:
Coherer:Induction

Status.......: Cracked
Input.Mode...: Mask (Inductio?l)
Hash.Target..: Coherer
Hash.Type....: WPA/WPA2
Time.Running.: 2 secs
Thanks for the quick response! Unfortunately I had already done that. I'm sorry if I did not make myself clear. I had already converted to .hccap format. I have tried a wordlist, I have tried masks, and I still can't get it.

My steps:
1. download .pcap from wireshark wiki
2. convert to .hccap on hashcat converter
3. load hashcat-gui x64 openCL
4. Mode: Brute-Force; Mask: Inductio?l; Hash type: WPA/WPA2
5. Start
6. be unhappy. :/
whats ur command line??
oclHashcat-plus64.exe --hash-type 2500 --attack-mode 3 C:\aa-Ben\files\hacks\WiFi\SSIDs\Induction.hccap Inductio?l
looks fine.. just tried it again..
so whats the result u get?? screenshot??
like i said, something is weird...

(2 pics should be attached)

The issues I can think of:
1. some settings issue somewhere
2. Running 0.5.1, need 0.7?
3. faulty download that's missing a file that allows program to run, but not find the file.

I think I'm going to try reinstalling...
hmmm... the last four things i can say is::
1- move the .hccap file to the program's directory.
2- run this command directly no GUI (in the oclHashcat-plus's directory)
Code:
oclHashcat-plus64 -m2500 -a3 Induction.hccap Inductio?l
3- if it doesn't work try to re-convert the cap file and rename it to something else.
4- in the GUI it says gpu temp. watchdog:90 while in the command prompt it says temp. watchdog disabled >> bigger problema : |

and no hashcat-gui v0.5.1 has oclHashcat-plus v0.071 already
Thank you for your help, but this is still an unanswered problem. Anyone else able to give it a shot!?!?
I tried it, works fine for me:

Quote:root@sf:~/xy/oclHashcat-plus-0.08# ./oclHashcat-plus64.bin -m 2500 6763_1335168861.hccap -a 3 Induction
oclHashcat-plus v0.08 by atom starting...

Hashes: 1
Unique salts: 1
Unique digests: 1
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes
GPU-Loops: 128
GPU-Accel: 16
Password lengths range: 8 - 15
Platform: AMD compatible platform found
Watchdog: Temperature limit set to 90c
Device #1: Tahiti, 2932MB, 0Mhz, 32MCU
Device #1: Allocating 38MB host-memory
Device #1: Kernel ./kernels/4098/m2500.Tahiti.64.kernel (1385948 bytes)

Coherer:Induction

Status.......: Cracked
Input.Mode...: Mask (Induction)
Hash.Target..: Coherer (00:0c:41:82:b2:55 <-> 00:0d:93:82:36:3a)
Hash.Type....: WPA/WPA2
Time.Running.: 1 sec
Time.Util....: 1000.6ms/0.0ms Real/CPU, 0.0% idle
Speed........: 1 c/s Real, 0 c/s GPU
Recovered....: 1/1 Digests, 1/1 Salts
Progress.....: 1/1 (100.00%)
Rejected.....: 0/1 (0.00%)
HW.Monitor.#1: 0% GPU, 41c Temp

Started: Mon Apr 23 10:18:37 2012
Stopped: Mon Apr 23 10:18:38 2012
root@sf:~/xy/oclHashcat-plus-0.08# echo Induction | ./oclHashcat-plus64.bin -m 2500 6763_1335168861.hccap
oclHashcat-plus v0.08 by atom starting...

Hashes: 1
Unique salts: 1
Unique digests: 1
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes
Rules: 1
GPU-Loops: 128
GPU-Accel: 16
Password lengths range: 8 - 15
Platform: AMD compatible platform found
Watchdog: Temperature limit set to 90c
Device #1: Tahiti, 2932MB, 0Mhz, 32MCU
Device #1: Allocating 38MB host-memory
Device #1: Kernel ./kernels/4098/m2500.Tahiti.64.kernel (1385948 bytes)

Starting attack in wordlist stdin mode...

Coherer:Induction

Status.......: Cracked
Input.Mode...: Pipe
Hash.Target..: Coherer (00:0c:41:82:b2:55 <-> 00:0d:93:82:36:3a)
Hash.Type....: WPA/WPA2
Time.Running.: 1 sec
Time.Util....: 1000.7ms/0.0ms Real/CPU, 0.0% idle
Speed........: 1 c/s Real, 0 c/s GPU
Recovered....: 1/1 Digests, 1/1 Salts
Progress.....: 1
Rejected.....: 0
HW.Monitor.#1: 0% GPU, 41c Temp

Started: Mon Apr 23 10:18:44 2012
Stopped: Mon Apr 23 10:18:46 2012

Guess you are just using a wrong catalyst version or you have or had the SDK installed or your hardware is defect.
Pages: 1 2