Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [asc] Views Posted
    Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake

Short answer to your question: Yes, it is possible with latest hashcat! Long statement: But you don't need that tool! Using only M1 and M2 is not a new idea. You can use every combination o...
ZerBea hashcat 8 11,183 08-01-2017, 05:09 PM
    Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake

And please keep in mind: hcxtools and hashcat are "area weapons" against wifi! hashcat (v3.6.0-279-g6946329b) starting... Session..........: hashcat Status...........: Running Hash.Type.........
ZerBea hashcat 8 11,183 08-01-2017, 07:11 PM
    Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake

Well, answering every probe request, makes it possible that a client will try to connect to us. In that case, we are the access point (ap) which the client expected to see. This is an attempt to get t...
ZerBea hashcat 8 11,183 08-01-2017, 11:23 PM
    Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake

ThiagoAlvarenga Wrote: (08-02-2017, 04:48 AM) -- This is my first post, if I'm posting from the wrong place, to the administrators, move to the correct location and accept my apologies. My native ...
ZerBea hashcat 8 11,183 08-02-2017, 07:10 AM
    Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake

braxxox Wrote: (08-02-2017, 03:22 AM) -- The -b option (beaconing on the last 10 probes) will seduce clients which do not send probes, yet, to probe us and then to connect us. I'm having a bit ...
ZerBea hashcat 8 11,183 08-02-2017, 06:54 AM
    Thread: WPA/WPA2 batch processing
Post: RE: WPA/WPA2 batch processing

Working on hashfile.16800 is easy to handle (much easier than working on hccapx files), as it is a txt file. That means, every bash command is working on that file. For example: get all ESSIDs with ...
ZerBea hashcat 8 5,348 09-27-2018, 10:58 AM
    Thread: WPA/WPA2 batch processing
Post: RE: WPA/WPA2 batch processing

Ok, now I know what you mean with "batch processing". That is aircrack-ng and/or pyrit style. hashcats provides this feature with hashmode 2501 (for hccapx) and 16801 for (PMKID). In both cases you ...
ZerBea hashcat 8 5,348 09-27-2018, 03:15 PM
    Thread: WPA/WPA2 batch processing
Post: RE: WPA/WPA2 batch processing

Great, 99% of your workflow is ok. A valid PMK file includes only PMKs: 181ad8169bf942af7d05a3cbd4f200f5f958ea8db4b5a768e17c716a30f61ff5 d99893b4593b3abc4c1179bd70c6244072ae4521047d4c449ecf90e8b2...
ZerBea hashcat 8 5,348 09-27-2018, 05:21 PM
    Thread: hccapx Problem
Post: RE: hccapx Problem

cap2hccapx is working fine. As far as I know, handshaker is a script that starts several different tools to capture a handshake. The result is a cleaned cap, containing only a beacon (or proberespo...
ZerBea hashcat 7 10,026 06-24-2017, 07:20 AM
    Thread: hccapx Problem
Post: RE: hccapx Problem

You can use hcxtools to capture. You can use wlancap2hcx to convert. wlancap2hcx will give you a warning that the cap was cleaned, but will convert it (but expect not a good result).
ZerBea hashcat 7 10,026 06-24-2017, 08:44 PM
    Thread: hccapx Problem
Post: RE: hccapx Problem

No problem: wlancap2hcx -x -e wordlist -o test.hccapx *.cap Options: -x -> match exact mac_ap and mac_sta -e -> extract also found passwords and networknames from wlan traffic (will be appended) ...
ZerBea hashcat 7 10,026 06-26-2017, 09:21 PM
    Thread: help with android wpa store
Post: RE: help with android wpa store

Hi ware55. use hashcat hashmode -m 12000 and read basic information (how-to) here: https://hashcat.net/forum/thread-6661-post-35846.html#pid35846 In case of an ANDROID hotspot default password...
ZerBea hashcat 7 6,779 12-17-2017, 11:28 AM
    Thread: help with android wpa store
Post: RE: help with android wpa store

Hi ware55. As this depends on your cell phone and your Android Version, it's a question to ask in this forum: https://forum.xda-developers.com
ZerBea hashcat 7 6,779 12-20-2017, 06:26 PM
    Thread: help with android wpa store
Post: RE: help with android wpa store

Thanks for the additional informations. Now I understand what you mean. Well, I assume - you use a SAMSUNG ANDROID device (?) - you have secure storage activated (?) - your device is rooted  (?) ...
ZerBea hashcat 7 6,779 12-17-2017, 05:15 PM
    Thread: help with android wpa store
Post: RE: help with android wpa store

Hi ware55. "what can i do?" Get the Masterkey of your phone and decrypt it. Use bash openssl and this (decrypted) key to decrypt your WiFi passwords. But it isn't an easy way and differs in th...
ZerBea hashcat 7 6,779 12-18-2017, 09:02 AM
    Thread: cap2hccapx - Networks detected: 0
Post: RE: cap2hccapx - Networks detected: 0

@ C-Sky91 Please attach capfile. I would like to take a look inside.
ZerBea hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 7 5,286 05-02-2019, 05:09 PM
    Thread: Hashcat not cracking even though dictionary has the password (wifi wpa)
Post: RE: Hashcat not cracking even though dictionary ha...

To find out, what's going on, we also need the cap file (uncleaned). Please compress it with zip and attach it here.
ZerBea hashcat 7 3,666 06-22-2019, 03:31 PM
    Thread: Hashcat not cracking even though dictionary has the password (wifi wpa)
Post: RE: Hashcat not cracking even though dictionary ha...

Thanks for the info.
ZerBea hashcat 7 3,666 06-23-2019, 10:46 AM
    Thread: hcxpcaptool does not detect beacon packet
Post: RE: hcxpcaptool does not detect beacon packet

Please post your hashcat command line. You must use the matching hash mode on hcxpcapngtool and hashcat . This command lines are valid: WPA-PBKDF2-PMKID+EAPOL: $ hcxpcapngtool -o test.22000 *....
ZerBea hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 7 2,671 02-18-2020, 01:03 PM
    Thread: Integer overflow detected in keyspace of mask
Post: RE: Integer overflow detected in keyspace of mask

2501 and 16801 hash modes are designed to verify (pre-)calculated PMKs. Latest hashcat use this modes to detect already recovered passwords, by testing the hash against the PMK (take a look at new has...
ZerBea General Talk 7 6,479 04-28-2019, 11:37 AM