Does oclHashcat support using only EAPOL packets 1 and 2?
After the first 2 packets of the handshake are sent, which contain the anonce and snonce, one should be able to run the handshake to retrieve the PSK, yes?
Wireshark indicates both packets are in the capture, aircrack-ng tells me I have a valid handshake, it writes the hccap, which is successfully loaded into oclhc, yet it never yields the password, though it is in the dictionary.
Anybody know why?
After the first 2 packets of the handshake are sent, which contain the anonce and snonce, one should be able to run the handshake to retrieve the PSK, yes?
Wireshark indicates both packets are in the capture, aircrack-ng tells me I have a valid handshake, it writes the hccap, which is successfully loaded into oclhc, yet it never yields the password, though it is in the dictionary.
Anybody know why?