Hi at all.
For tests, I will try to crack two my WPA test key.
I use Kali and aircrak-ng... well, now I have rhe handsake and the cap files, then I converted with
aircrack-ng <out.cap> -J <out.hccap>
the first file has is for the key 12121212 and with a brute force attack I will find in few seconds. perfect.
for the second file the key is mao1mao1: I don't wait more time, and I create a simple dictionary.txt with 6 lines, one of this is mao1mao1
ok: -m 2500 -a 0 file.hccap dictionary.txt.... but nothing. recovered 0/1.
the configuration is: oclhashcat 1.32, win7 32 bit, Catalyst 14.9, ATI 5850
any ideas?
For tests, I will try to crack two my WPA test key.
I use Kali and aircrak-ng... well, now I have rhe handsake and the cap files, then I converted with
aircrack-ng <out.cap> -J <out.hccap>
the first file has is for the key 12121212 and with a brute force attack I will find in few seconds. perfect.
for the second file the key is mao1mao1: I don't wait more time, and I create a simple dictionary.txt with 6 lines, one of this is mao1mao1
ok: -m 2500 -a 0 file.hccap dictionary.txt.... but nothing. recovered 0/1.
the configuration is: oclhashcat 1.32, win7 32 bit, Catalyst 14.9, ATI 5850
any ideas?