crackmyhash
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
I need assistance cracking a WPA2 handshake
#1
Hello, 
I am lewrning ethical hacking as a hobby. I recently learned how to capture a 4way handshake using aircrack-ng on Ubuntu 18.04. I wanted to crack the hccapx file but the estimated time format it was 2000 years in hashcat.i wanted to know how to crack the hash. Could you help me?

PS: I am just 14 so I don't really have any kind of money ?

Hash: 
WPA*02*f9ef46a835b50abc68c2dfb2be31af79*ec79f20644dd*9eb5b90b12c7*4461727368616e615f536b794e6574*f27faa15c45302dafa95cf4524cf5840f4ca2c9ff61faeb370bbc5ba20a70c25*0103007702010a00000000000000000000e65d0ad470837ba815298e966d91c92aa176a70e793089d08d4a490b942cd9b1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001830160100000fac020100000fac040100000fac0200000000*02

Also attached the hccapx file
#2
The following 2 hash-modes match the structure of your input hash:

# | Name | Category
======+=====================================================+======================================
22000 | WPA-PBKDF2-PMKID+EAPOL | Network Protocols
22001 | WPA-PMK-PMKID+EAPOL | Network Protocols
#3
To attach a file use:
https://dropmefiles.com/
https://www.sendspace.com
#4
(09-13-2021, 11:22 AM)freeroute Wrote: The following 2 hash-modes match the structure of your input hash:

      # | Name                                                | Category
  ======+=====================================================+======================================
  22000 | WPA-PBKDF2-PMKID+EAPOL                              | Network Protocols
  22001 | WPA-PMK-PMKID+EAPOL                                | Network Protocols
I am getting hash type not found in hashcat, I probably did something wrong ?
#5
f9ef46a835b50abc68c2dfb2be31af79:ec79f20644dd:9eb5b90b12c7:Darshana_SkyNet:[email protected]
#6
Omg! Thank you so much! Could you please explain it in brief?

Thanks again!
#7
@freeroute Please close this thread, I have got the passphrase

Forum Jump:

Users browsing this thread: 1 Guest(s)