View Single Post
Posts: 9 | Thanked: 3 times | Joined on Sep 2010 @ UK
#516
Originally Posted by Unhuman View Post
After capturing a WPA handshake, aircrack can't find the passphrase. I created a 5 word dictionary:

The password is 0987654321,but aircrack says "passphrase not found in dictionary" ? Any hints?

=================

Something strange is going on:

-N900 reads the .cap file like this:
"Read 12302 packets.
# 1
BSSID 00:23:CD:14:XX:XX (last numbers removed by me)
ESSID: VLH
Encryption WPA (1 handshake)

Choosing first network as target.
Opening lucid-01.cap..............

Paraphrase not in dictionary.


HOWEVER - Backtrack 4 reads the .cap file like this:

Read 12302 packets.

# 1
BSSID 00:23:CD:14:XX:XX (last numbers removed by me)
ESSID: VLH
Encryption WPA (0 handshake)

Choosing first network as target.
Opening lucid-01.cap.............

No valid WPA handshakes found...
Quiting aircrack-ng...

-> wpacracker.com also says "No WPA handshake found for ESSID." when I upload the cap file.


Has anyone tried to do a dictionary attack with a handshake grabbed with neopwn?




+ Has anyone tried a rainbow table attack?
Just got a handshake and cracked my AP using grimwepa and the default_pw.txt