05-14-2015, 02:58 PM
Hi all first post
I have a problem Windows cudaHashcat64 will not crack 3 known pass phrase WPA handshakes that can be cracked using aircrack and hashcat 0.49 on a Linux (The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali)) box
[attachment=319]
In attached Zip file are the
wpa.cap (4 handshakes. 3 of which are known hashes)
test.txt (Test dictionary containing 4 words, the first 2 are correct for 3 of the handshakes)
converted.hccap - the cap file converted to hashcat format using the online cap2hccap
The command line on the widows box I am using is cudaHashcat64 -m 2500 converted.hccap test.txt.
I get Recovered......: 0/4 (0.00%) Digests, 0/4 (0.00%) Salts so none cracked at all. I can however crack them using the same data using Aircrack and hashcat on Linux.
I have looked for someone having similar problems and found none so I must be doing something wrong?
Anyways your help is greatly appreciated.
I have a problem Windows cudaHashcat64 will not crack 3 known pass phrase WPA handshakes that can be cracked using aircrack and hashcat 0.49 on a Linux (The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali)) box
[attachment=319]
In attached Zip file are the
wpa.cap (4 handshakes. 3 of which are known hashes)
test.txt (Test dictionary containing 4 words, the first 2 are correct for 3 of the handshakes)
converted.hccap - the cap file converted to hashcat format using the online cap2hccap
The command line on the widows box I am using is cudaHashcat64 -m 2500 converted.hccap test.txt.
I get Recovered......: 0/4 (0.00%) Digests, 0/4 (0.00%) Salts so none cracked at all. I can however crack them using the same data using Aircrack and hashcat on Linux.
I have looked for someone having similar problems and found none so I must be doing something wrong?
Anyways your help is greatly appreciated.