Quantcast
Channel: hashcat Forum - All Forums
Viewing all articles
Browse latest Browse all 7675

cracked WPA doesnt work

$
0
0
Hi all,

So i have been cracking WPA keys for quite a while now. Yesterday i collected myself a handshake and started running a few dic attacks with succes. When trying to connect with the password however i get a popup asking me to re-enter my password. To try and find the cause i tried the following:
1. deleted specific entry in cudahashcat.pot
2. captured new handshake with different method and reran dict attack (validated handshake with cowputty)
3. tried placing same password in different dic and it found the password again
4. Cloned mac addresses of (past) connected clients before connecting
5. Confirm signal strength is OK

I am running out of idea's what might cause this problem. Whatever i do, i keep getting the same key. Whats up with this?


Generated dictionary stats for C:\homegrown.dic: 3558 bytes, 503 words, 503 keyspace


INFO: approaching final keyspace, workload adjusted

WIRELESS:1449e070xxxx:4ceb4223xxxx:passwordhere

Session.Name...: cudaHashcat
Status.........: Cracked
Input.Mode.....: File (C:\homegrown.dic)
Hash.Target....: WIRELESS (14:49:e0:70:XX:XX <-> 4c:eb:42:23:XX:XX)
Hash.Type......: WPA/WPA2
Time.Started...: 0 secs
Speed.GPU.#1...: 94 H/s
Recovered......: 1/1 (100.00%) Digests, 1/1 (100.00%) Salts
Progress.......: 503/503 (100.00%)
Skipped........: 0/503 (0.00%)
Rejected.......: 455/503 (90.46%)
HWMon.GPU.#1...: 58% Util, 49c Temp, N/A Fan

Viewing all articles
Browse latest Browse all 7675

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>