Hello all,
Can someone tell me why every time I convert a cap file to hccapx cap2hccapx writes 2 or more handshakes. When intial cap file is checked with aircrack aircrack shows on 1 handshake
# BSSID ESSID Encryption
1 50:6A:03:5A:47:00 VM183851-2G WPA (1 handshake)
*] BSSID=50:6a:03:5a:47:00 ESSID=VM183851-2G (Length: 11)
--> STA=d0:33:11:1d:09:23, Message Pair=0, Replay Counter=1
--> STA=d0:33:11:1d:09:23, Message Pair=2, Replay Counter=1
--> STA=d0:33:11:1d:09:23, Message Pair=0, Replay Counter=1
Written 3 WPA Handshakes to: vm183512g.hccapx
# BSSID ESSID Encryption
1 50:6A:03:5A:47:00 VM183851-2G WPA (1 handshake)
2 50:6A:03:5A:47:00 VM183851-2G WPA (1 handshake)
3 50:6A:03:5A:47:00 VM183851-2G WPA (1 handshake)
Please any info how to fix this as it seems to stop hashcat cracking this hash even when I put the password as the mask.
Thanks Kev
Can someone tell me why every time I convert a cap file to hccapx cap2hccapx writes 2 or more handshakes. When intial cap file is checked with aircrack aircrack shows on 1 handshake
# BSSID ESSID Encryption
1 50:6A:03:5A:47:00 VM183851-2G WPA (1 handshake)
*] BSSID=50:6a:03:5a:47:00 ESSID=VM183851-2G (Length: 11)
--> STA=d0:33:11:1d:09:23, Message Pair=0, Replay Counter=1
--> STA=d0:33:11:1d:09:23, Message Pair=2, Replay Counter=1
--> STA=d0:33:11:1d:09:23, Message Pair=0, Replay Counter=1
Written 3 WPA Handshakes to: vm183512g.hccapx
# BSSID ESSID Encryption
1 50:6A:03:5A:47:00 VM183851-2G WPA (1 handshake)
2 50:6A:03:5A:47:00 VM183851-2G WPA (1 handshake)
3 50:6A:03:5A:47:00 VM183851-2G WPA (1 handshake)
Please any info how to fix this as it seems to stop hashcat cracking this hash even when I put the password as the mask.
Thanks Kev