After capturing a WPA handshake, aircrack can't find the passphrase. I created a 5 word dictionary: The password is 0987654321,but aircrack says "passphrase not found in dictionary" ? Any hints? ================= Something strange is going on: -N900 reads the .cap file like this: "Read 12302 packets. # 1 BSSID 00:23:CD:14:XX:XX (last numbers removed by me) ESSID: VLH Encryption WPA (1 handshake) Choosing first network as target. Opening lucid-01.cap.............. Paraphrase not in dictionary. HOWEVER - Backtrack 4 reads the .cap file like this: Read 12302 packets. # 1 BSSID 00:23:CD:14:XX:XX (last numbers removed by me) ESSID: VLH Encryption WPA (0 handshake) Choosing first network as target. Opening lucid-01.cap............. No valid WPA handshakes found... Quiting aircrack-ng... -> wpacracker.com also says "No WPA handshake found for ESSID." when I upload the cap file. Has anyone tried to do a dictionary attack with a handshake grabbed with neopwn? + Has anyone tried a rainbow table attack?