esp32-wifi-penetration-tool icon indicating copy to clipboard operation
esp32-wifi-penetration-tool copied to clipboard

Hashcat no hashes loaded from capture.hccapx

Open HackWidMaddy opened this issue 1 year ago • 2 comments

─(kali㉿windows)-[~/Desktop] └─$ hashcat -m 22000 capture.hccapx pass

hashcat (v6.2.5) starting

OpenCL API (OpenCL 2.0 pocl 1.8 Linux, None+Asserts, RELOC, LLVM 11.1.0, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]

  • Device #1: pthread-Intel(R) Core(TM) i3-7020U CPU @ 2.30GHz, 708/1480 MB (256 MB allocatable), 4MCU

Minimum password length supported by kernel: 8 Maximum password length supported by kernel: 63

Hashfile 'capture.hccapx' on line 1 (HCPX): Separator unmatched Hashfile 'capture.hccapx' on line 2 (): Separator unmatched No hashes loaded.

Started: Thu Dec 7 08:20:45 2023 Stopped: Thu Dec 7 08:20:52 2023

HackWidMaddy avatar Dec 07 '23 13:12 HackWidMaddy

Does the hccapx file contain any data?

risinek avatar Dec 08 '23 08:12 risinek

@greencatcommunity hccapx (binary format, old mode 2500) is deprecated and should not be used any longer. It has been replaced by the new format 22000 (ASCII). Specification is here (Working with hash files): https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2

A feature request has been opened here: https://github.com/risinek/esp32-wifi-penetration-tool/issues/37

ZerBea avatar Jan 07 '24 17:01 ZerBea