Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: cap2hccap Problem.
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hi. im just another noobie tries to crack AP.

I sucessfully Captured handshakes from sniffing tool called CommView, and saved packets as ".cap".
and i tried to use this website's cap2hccap tool to change extension for hashcat.
but, cap2hccap says it doesnt contains handshakes tho i can check it contains handshake at cap file.

[error   ] unable to find valid handshakes.

what is the problem? what did i missed?
Any helps will be appriciated. thanks.

P.S. i attached my cap files for analyzing.
Dump.Zip
ncf is originally saved file, and cap file is the file which i saved as different extension.
Bump, Still needs help.
Code:
root@The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali):~# aircrack-ng -J dump Dump.CAP
Opening Dump.CAP
Read 2202 packets.

  #  BSSID              ESSID                     Encryption

  1  00:30:0D:AB:E2:AC                            WPA (1 handshake)
  2  CC:8C:66:AB:E2:AC                            Unknown
  3  00:30:0D:AB:A2:8F                            Unknown
  4  00:30:0D:03:FA:75                            Unknown
  5  00:B0:59:67:F4:75                            Unknown
  6  00:CA:50:9A:0D:9B                            Unknown
  7  00:30:0D:8B:F7:75                            Unknown
  8  AE:31:0D:AB:E2:2C                            WPA (0 handshake)
  9  00:AD:F6:AB:E2:AC                            WPA (0 handshake)
<snip>

Index number of target network ? 1

Opening Dump.CAP
An ESSID is required. Try option -e.

root@The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali):~#

There's no ESSID broadcast in that .cap file either and you'll need that to have a go at cracking. I'm no network expert so can't identify the WPA type from the .cap file but it may not even be crackable if there's a RADIUS server involved, i.e. if it's WPA-Enterprise (WPA-802.1x, RADIUS).