esp32-wifi-penetration-tool
esp32-wifi-penetration-tool copied to clipboard
Hashcat no hashes loaded from capture.hccapx
─(kali㉿windows)-[~/Desktop] └─$ hashcat -m 22000 capture.hccapx pass
hashcat (v6.2.5) starting
OpenCL API (OpenCL 2.0 pocl 1.8 Linux, None+Asserts, RELOC, LLVM 11.1.0, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
- Device #1: pthread-Intel(R) Core(TM) i3-7020U CPU @ 2.30GHz, 708/1480 MB (256 MB allocatable), 4MCU
Minimum password length supported by kernel: 8 Maximum password length supported by kernel: 63
Hashfile 'capture.hccapx' on line 1 (HCPX): Separator unmatched Hashfile 'capture.hccapx' on line 2 (): Separator unmatched No hashes loaded.
Started: Thu Dec 7 08:20:45 2023 Stopped: Thu Dec 7 08:20:52 2023
Does the hccapx file contain any data?
@greencatcommunity hccapx (binary format, old mode 2500) is deprecated and should not be used any longer. It has been replaced by the new format 22000 (ASCII). Specification is here (Working with hash files): https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2
A feature request has been opened here: https://github.com/risinek/esp32-wifi-penetration-tool/issues/37