Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [desc] Views Posted
    Thread: convert a WPA / WPA2 pcap
Post: RE: convert a WPA / WPA2 pcap

the file name looks like you use a stupid script to capture and prepare wifi traffic! please read this: https://hashcat.net/forum/thread-6666-post-35540.html#pid35540
ZerBea General Talk 9 15,382 10-11-2017, 07:41 AM
    Thread: How to encrypt password with wpa2?
Post: RE: How to encrypt password with wpa2?

Take a look at hcxtools and hcxkeys. The suite contains various converters (except converters which are able to flood online hashcrackers with fake hashes). If you would like to learn how it (PBKDF2) ...
ZerBea hashcat 9 3,127 08-15-2019, 10:30 AM
    Thread: skipping file: (null) (invalid eapol size)
Post: RE: skipping file: (null) (invalid eapol size)

hcxdumptool and hcxtools are working fine on UBUNTU 18.04 (as used here): https://www.nomotion.net/blog/cracking-wifi-without-clients-pmkid-method/ and they will be official part in next UBUNTU vers...
ZerBea hashcat 9 3,037 08-27-2019, 07:31 PM
    Thread: skipping file: (null) (invalid eapol size)
Post: RE: skipping file: (null) (invalid eapol size)

That are good news. Thanks for the feedback. Now start to capture (over a long time) and collect hcxpcaptool -E -I -U lists and -o -k hashfiles. At regular intervals run your hashes against this lis...
ZerBea hashcat 9 3,037 08-31-2019, 11:14 PM
    Thread: skipping file: (null) (invalid eapol size)
Post: RE: skipping file: (null) (invalid eapol size)

On the first run, you need some steps to identify a suitable interface, to check driver and to check that packet injection is working. Also you must identify processes that interferes with hcxdumptool...
ZerBea hashcat 9 3,037 08-31-2019, 07:48 AM
    Thread: Speed comparison WPA/WPA2 (2500) vs WPA/WPA2 PMK (2501)
Post: RE: Speed comparison WPA/WPA2 (2500) vs WPA/WPA2 P...

You can't compare 2500 to 2501 and 16800 to 16801. 2500 and 16800 are hash modes to get a PSK, while 2501 and 16801 hash modes are used to verify a given(!) PMK. BTW: Both modes 250x and 1680x ar...
ZerBea hashcat 9 4,600 01-06-2020, 02:34 PM
    Thread: Speed comparison WPA/WPA2 (2500) vs WPA/WPA2 PMK (2501)
Post: RE: Speed comparison WPA/WPA2 (2500) vs WPA/WPA2 P...

Speed depend on count of hashes inside the hash file and/or nonce-error-correction value. How have you measured the 20%? I can't reproduce such a big difference running an example hash from here: ...
ZerBea hashcat 9 4,600 03-23-2020, 09:36 AM
    Thread: Speed comparison WPA/WPA2 (2500) vs WPA/WPA2 PMK (2501)
Post: RE: Speed comparison WPA/WPA2 (2500) vs WPA/WPA2 P...

Great, thanks for posting your result. Some words about nonce error corrections (NC): NC values have a deep impact on hashcat speed. Within hccapx and 22000 hash records the message pair field is use...
ZerBea hashcat 9 4,600 03-23-2020, 03:22 PM
    Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx

Upload the cap here: https://wpa-sec.stanev.org/?nets
ZerBea hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 10 14,097 05-18-2018, 05:56 PM
    Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx

...or simple use hcxtools for capturing and conversion, as they provide nonce-error-corrections and more... BTW: hcxtools running in background of wpa-sec and they did the conversion!
ZerBea hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 10 14,097 05-19-2018, 09:15 AM
    Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx

Hi kexec. That is a typical aircrack capture. You captured 125954 packets (3.949.735 Bytes) for only one unauthorized handshake (tons of useless frames inside). $ hcxpcaptool -o test.hccapx -E wordl...
ZerBea hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 10 14,097 05-22-2018, 09:45 AM
    Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx

Hi kexec. I see that you successfully converted it to hccapx using hcxpcaptool, so it is a bug in hashcat's cap2hccapx? hcxpcaptool is completely different to other tools, so it will convert your...
ZerBea hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 10 14,097 05-23-2018, 08:14 PM
    Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx

So the problem is that if cap contains a lot of garbage packets, cap2hccapx cant convert it? How to determine which packets are not needed and I can delete them from .cap file? You can do a cleaning ...
ZerBea hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 10 14,097 05-23-2018, 10:27 PM
    Thread: PMKID Generates Wrong ESSID And Password From Hash
Post: RE: PMKID Generates Wrong ESSID And Password From ...

This is very difficult to answer, because your question is very imprecise. A PMKID is transmitted by the access point (ap) or by a client. There might be something wrong in your work flow. To g...
ZerBea hashcat 10 3,630 06-09-2019, 10:49 AM
    Thread: PMKID Generates Wrong ESSID And Password From Hash
Post: RE: PMKID Generates Wrong ESSID And Password From ...

Yes you are quite right there, by default, hcxdumptool attacks everything in range. You can either set a target (by filter option), or remove not wanted hashes by hand (PMKID hash file) or by wlanhcx...
ZerBea hashcat 10 3,630 06-09-2019, 06:51 PM
    Thread: PMKID Generates Wrong ESSID And Password From Hash
Post: RE: PMKID Generates Wrong ESSID And Password From ...

Yes, that is the MAC of the access point.
ZerBea hashcat 10 3,630 06-09-2019, 09:34 PM
    Thread: PMKID Generates Wrong ESSID And Password From Hash
Post: RE: PMKID Generates Wrong ESSID And Password From ...

No problem, you're welcome.
ZerBea hashcat 10 3,630 06-09-2019, 10:29 PM
    Thread: Mode 22000 Bad file descriptor
Post: RE: Mode 22000 Bad file descriptor

Thanks. Now, I understand. Please forgive me - I'm old... 16800 can be used for similar hash types from other sources, too - while 22000 not. 22000 is designed for use on WiFi only.
ZerBea hashcat 10 3,156 01-19-2020, 05:44 PM
    Thread: Mode 22000 Bad file descriptor
Post: RE: Mode 22000 Bad file descriptor

BTW: This is a nice feature request on the new hashline: https://github.com/hashcat/hashcat/issues/2290 I'm playing around with latest commit (Atom added this feature). Now it's easy to correlate h...
ZerBea hashcat 10 3,156 01-19-2020, 10:55 PM
    Thread: hashcat v6.1.0
Post: RE: hashcat v6.1.0

Thanks for this update. Good work.
ZerBea hashcat 10 4,017 07-28-2020, 01:06 PM