Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Due to several big endian fixes, hcxdumptool and hcxtools moved to v 5.0.1. I received a notice that they are running on OpenWRT. But keep in mind: Both, PMKID attack vector and AP-LESS attack vect...
ZerBea User Contributions 187 1,293,321 11-27-2018, 08:48 AM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA using PMKID

Thanks for reporting this issue. I fixed it with the last commit. We tried to use filterlist entries on the first outgoing broadcast packet. Since there are no incomming packets at this moment, we ru...
ZerBea User Contributions 187 1,293,321 08-05-2018, 10:53 AM
    Thread: need help with hcx dumptool what am i doing wrong
Post: RE: need help with hcx dumptool what am i doing wr...

In your case: [16:26:17 - 001] 009fa9073914 -> 5c93a20b3897 [FOUND AUTHORIZED HANDSHAKE, EAPOL TIMEOUT 2516] [16:40:15 - 001] 009fa9073914 -> ccfb65942f7e [FOUND AUTHORIZED HANDSHAKE, EAPOL TIMEOUT ...
ZerBea hashcat 2 2,293 11-06-2018, 10:36 AM
    Thread: need help with hcx dumptool what am i doing wrong
Post: RE: need help with hcx dumptool what am i doing wr...

Added new filter mode 3 (filter receiving branch) to hcxdumptool. --filterlist= : mac filter list format: 112233445566 + comment ...
ZerBea hashcat 2 2,293 11-07-2018, 12:18 PM
    Thread: Need help with hashcat
Post: RE: Need help with hashcat

Download latest CUDA (10.2) from here: https://developer.nvidia.com/cuda-downloads or use Arch Linux: $ uname -r 5.5.2-arch1-1 $ pacman -Q | grep nvidia nvidia 440.59-3 nvidia-settings 440....
ZerBea hashcat 2 1,053 02-06-2020, 11:11 AM
    Thread: Need help on converting to hccap or run newer Hashcat
Post: RE: Need help on converting to hccap or run newer ...

https://github.com/aircrack-ng/aircrack-ng/issues/1993 https://github.com/aircrack-ng/aircrack-ng/issues/2067 If you attach the cap file here (zip compressed), we can take a look inside. and/or...
ZerBea hashcat 3 1,392 08-27-2019, 12:28 PM
    Thread: need batch stop after pass found hccapx
Post: RE: need batch stop after pass found hccapx

Does it work with the example hash from here if the PSK is in passlist1.txt? https://hashcat.net/misc/example_hashes/hashcat.hccapx 64 -m 2500 -t 25 --remove -o cracked.txt 1.hccapx pass/passlist1...
ZerBea hashcat 15 3,946 01-27-2020, 06:05 PM
    Thread: need batch stop after pass found hccapx
Post: RE: need batch stop after pass found hccapx

msalman Wrote: (01-28-2020, 03:58 PM) -- the pass is in my first wordlist 11223344 -- The attached hccapx file is a multi hash file. It contain 15 hashes (6 of them are dupes). If one of them is n...
ZerBea hashcat 15 3,946 01-28-2020, 04:44 PM
    Thread: need batch stop after pass found hccapx
Post: RE: need batch stop after pass found hccapx

hashcat online converter run cap2hccapx from hashcat-utils. You should know that cap2hccapx will convert more than one hash to the hccapx file. Therefore it takes every good message pair and convert ...
ZerBea hashcat 15 3,946 02-01-2020, 09:38 PM
    Thread: need batch stop after pass found hccapx
Post: RE: need batch stop after pass found hccapx

No, you have to code it by yourself. It is very simple: https://github.com/ZerBea/hcxtools/issues/121#issuecomment-581013958
ZerBea hashcat 15 3,946 02-04-2020, 04:34 PM
    Thread: need batch stop after pass found hccapx
Post: RE: need batch stop after pass found hccapx

One last question: Which options have you used to capture the dumpfile? I noticed that all(!) undirected proberequest frames are not present (filtered out). This frames may contain information abo...
ZerBea hashcat 15 3,946 02-06-2020, 11:52 AM
    Thread: Mode 22000 Bad file descriptor
Post: RE: Mode 22000 Bad file descriptor

Mem5 Wrote: (01-18-2020, 12:51 AM) -- Using hashcat-5.1.0 beta 1610 : Code: -- hashcat.exe -m 22000 hash dic -- works OK with sample hash WPA*01*9d42bfc4ab79cf3a3a85761efd2a0cf0*e8e61d2bfe07*e2...
ZerBea hashcat 10 3,156 01-18-2020, 02:05 PM
    Thread: Mode 22000 Bad file descriptor
Post: RE: Mode 22000 Bad file descriptor

Thanks. Now, I understand. Please forgive me - I'm old... 16800 can be used for similar hash types from other sources, too - while 22000 not. 22000 is designed for use on WiFi only.
ZerBea hashcat 10 3,156 01-19-2020, 05:44 PM
    Thread: Mode 22000 Bad file descriptor
Post: RE: Mode 22000 Bad file descriptor

We decided not to use ASCII characters, because: Wireless network stacks must still be prepared to handle arbitrary values in the SSID field! Using HEX instead of ASCII makes it easier to use com...
ZerBea hashcat 10 3,156 01-19-2020, 02:19 PM
    Thread: Mode 22000 Bad file descriptor
Post: RE: Mode 22000 Bad file descriptor

BTW: This is a nice feature request on the new hashline: https://github.com/hashcat/hashcat/issues/2290 I'm playing around with latest commit (Atom added this feature). Now it's easy to correlate h...
ZerBea hashcat 10 3,156 01-19-2020, 10:55 PM
    Thread: Linux + AMD + hashcat
Post: RE: Linux + AMD + hashcat

The enormous misunderstanding of AMD is that they really think LINUX is UBUNTU, or CentOS or RHEL: The ROCm 2.0.x platform supports the following operating systems: Ubuntu 16.04.x and 18.04.x (V...
ZerBea hashcat 3 2,984 09-05-2019, 04:08 PM
    Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers

Hi soxrok2212. Did a quick binwalk, unsquashfs and radare2 on some files and noticed that the values are retrieved from the board: ls /sys/module/board/parameters/*.* or by debugsys --info squas...
ZerBea User Contributions 182 305,378 08-24-2018, 01:33 PM
    Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers

...and if you don't have the default ESSID (with the 4 xdigits, required by the WIFI keygen), $ hcxpsktool --digit10 will calculate the whole key space , based on wpa-sec analyses (known SEEDs): $ hc...
ZerBea User Contributions 182 305,378 05-16-2020, 10:04 AM
    Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers

Maybe you're interested in this (not only ATT): https://boxnet.servehttp.com/cap/pix/DUMP/ BTW: You can reduce the key space, if you assume "N0" within every serial number: dddddN0ddddd That mak...
ZerBea User Contributions 182 305,378 05-20-2020, 09:25 AM
    Thread: Integer overflow detected in keyspace of mask
Post: RE: Integer overflow detected in keyspace of mask

2501 and 16801 hash modes are designed to verify (pre-)calculated PMKs. Latest hashcat use this modes to detect already recovered passwords, by testing the hash against the PMK (take a look at new has...
ZerBea General Talk 7 6,481 04-28-2019, 11:37 AM