hoping for help
i had an idea playing with hashcat where it says
Added hashes from file bt.hccap: 1 (1 salts)
is there a way you can make hashcat display the loaded hash/salt or is there any program or website i can use to extract the hash/salt
i tried the following
editcap -v -D 0 BTHub3-MQZX.cap /dev/null wich gave me loads of hashes to many to list
wireshark (had a look around reading a big manual on how to use)
capinfos BTHub3-MQZX.cap which gave me 1 SHA1, RIPEMD160, MD5
md5sum BTHub3-MQZX.cap and bt.hccap gave me MD5 hash ee82e86b4e10b3e9aa761e89fe3fff60 and 6efcd68a648a0255606eef37f9e15f45 respectively
tested all hashes with all different -m 0 - 7600 (hashcat did not work took some time) i know the caps good i tried in aircrack and cowpatty with small passlist
and got KEY FOUND! [ 8d9bb4aee3 ]
i stripped my cap down to just the 4 eapol packets which i then ran the stripped cap through the above programs got different hashes c91ab0c98f27612b40e9a5a7d22107f1
!!!!someone please tell me if i can get the hash/salt from my cap file you should be able to if it can load it then you should be able to see it or if those programs gave the right hash were did i go so wrong!!!!
should stress if you dont want to tell me how (the full command) to do it please point me in the right direction and i will figger it out my self
thanks
newbie but keen2learn
i had an idea playing with hashcat where it says
Added hashes from file bt.hccap: 1 (1 salts)
is there a way you can make hashcat display the loaded hash/salt or is there any program or website i can use to extract the hash/salt
i tried the following
editcap -v -D 0 BTHub3-MQZX.cap /dev/null wich gave me loads of hashes to many to list
wireshark (had a look around reading a big manual on how to use)
capinfos BTHub3-MQZX.cap which gave me 1 SHA1, RIPEMD160, MD5
md5sum BTHub3-MQZX.cap and bt.hccap gave me MD5 hash ee82e86b4e10b3e9aa761e89fe3fff60 and 6efcd68a648a0255606eef37f9e15f45 respectively
tested all hashes with all different -m 0 - 7600 (hashcat did not work took some time) i know the caps good i tried in aircrack and cowpatty with small passlist
and got KEY FOUND! [ 8d9bb4aee3 ]
i stripped my cap down to just the 4 eapol packets which i then ran the stripped cap through the above programs got different hashes c91ab0c98f27612b40e9a5a7d22107f1
!!!!someone please tell me if i can get the hash/salt from my cap file you should be able to if it can load it then you should be able to see it or if those programs gave the right hash were did i go so wrong!!!!
should stress if you dont want to tell me how (the full command) to do it please point me in the right direction and i will figger it out my self
thanks
newbie but keen2learn