Thread
:
NeoPwn v2 = BackTrack Mobile!
View Single Post
Unhuman
2010-09-10 , 16:54
Posts: 111 | Thanked: 87 times | Joined on Jan 2010 @ Plovdiv, Bulgaria
#
515
After capturing a WPA handshake, aircrack can't find the passphrase. I created a 5 word dictionary:
1234567890
0987654321
123456
1234567
12345678
The password is 0987654321,but aircrack says "passphrase not found in dictionary" ? Any hints?
=================
Something strange is going on:
-N900 reads the .cap file like this:
"Read 12302 packets.
# 1
BSSID 00:23:CD:14:XX:XX (last numbers removed by me)
ESSID: VLH
Encryption WPA (1 handshake)
Choosing first network as target.
Opening lucid-01.cap..............
Paraphrase not in dictionary.
HOWEVER - Backtrack 4 reads the .cap file like this:
Read 12302 packets.
# 1
BSSID 00:23:CD:14:XX:XX (last numbers removed by me)
ESSID: VLH
Encryption WPA (0 handshake)
Choosing first network as target.
Opening lucid-01.cap.............
No valid WPA handshakes found...
Quiting aircrack-ng...
-> wpacracker.com also says "No WPA handshake found for ESSID." when I upload the cap file.
Has anyone tried to do a dictionary attack with a handshake grabbed with neopwn?
+ Has anyone tried a rainbow table attack?
Last edited by Unhuman; 2010-09-10 at
22:15
.
Quote & Reply
|
Unhuman
View Public Profile
Send a private message to Unhuman
Find all posts by Unhuman