10-28-2014, 01:32 PM
Hi there
I seem to be doing all the right things when it comes to capturing hanshakes and converting them to .hccap files
The problem is hashcat is cracking the .hccap files but I don't know how to make it output the password it has cracked!
In order to quickly test that I was using oclhashcat correctly, I set up an AP and gave it the PW whiskey1 which I know is listed in the rockyou wordlist. I captured the handshake and converted it to a .hccap file
I followed the directions from this link https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2 and created a batch file however I believe more commands are needed to output the cracked password.
After a bit of digging around I came across this batch file which looked pretty sweet
and hoped that it might have been able to help - https://pastie.org/8933810#1-2
As the author must have been using an Nvidia GPU I replaced anything with cudda to ocl as I am running AMD
The file works away and come up saying that it has cracked the password but once again I don't seem to get any option to specify where the cracked password is to be outputted to!
Could someone please let me know what command I need to add, in order to actually see if the PW has been cracked
Also as I mainly game and the world of cracking is only something that I have just taken an interest in I run a pair of 7970s in CF. There can be a bit of an overheating issue as I am using a matx board so the cards sit very close together. I can usually use AMD overdrive to drop the GPU speed down a little on both cards to reduce overheating issues without sacrificing too much performance. The bottom card never overheats as it has nothing getting in the way of its airflow. However the top card gets bugger all airflow due to the tiny gap between cards. If I was able to limit the workload on the top card with some sort of command it would be beneficial as oclhashcat docent seem to take any notice of what the overdrive settings are
Many thanks
I seem to be doing all the right things when it comes to capturing hanshakes and converting them to .hccap files
The problem is hashcat is cracking the .hccap files but I don't know how to make it output the password it has cracked!
In order to quickly test that I was using oclhashcat correctly, I set up an AP and gave it the PW whiskey1 which I know is listed in the rockyou wordlist. I captured the handshake and converted it to a .hccap file
I followed the directions from this link https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2 and created a batch file however I believe more commands are needed to output the cracked password.
After a bit of digging around I came across this batch file which looked pretty sweet
and hoped that it might have been able to help - https://pastie.org/8933810#1-2
As the author must have been using an Nvidia GPU I replaced anything with cudda to ocl as I am running AMD
The file works away and come up saying that it has cracked the password but once again I don't seem to get any option to specify where the cracked password is to be outputted to!
Could someone please let me know what command I need to add, in order to actually see if the PW has been cracked
Also as I mainly game and the world of cracking is only something that I have just taken an interest in I run a pair of 7970s in CF. There can be a bit of an overheating issue as I am using a matx board so the cards sit very close together. I can usually use AMD overdrive to drop the GPU speed down a little on both cards to reduce overheating issues without sacrificing too much performance. The bottom card never overheats as it has nothing getting in the way of its airflow. However the top card gets bugger all airflow due to the tiny gap between cards. If I was able to limit the workload on the top card with some sort of command it would be beneficial as oclhashcat docent seem to take any notice of what the overdrive settings are
Many thanks