Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Cracked Hashes Skipped? Mode 2500 WPA/WPA2
Hey, thanks for bringing up the example. There were quite some changes to the WPA in the last months. The issue is that hashcat does print other parts of the hashes than what the input list looked like, which needs special handling which was not yet put into place.

If you would like to help out, please create an issue on the github repository providing the above information, if possible attach the hccapx file of the above found you posted, so we can reproduce. Also state if the 'salted' flag was checked on import or not.
I can check this then, but I'm pretty sure that this is a bug as it was not updated when the hccapx format output changed.

Messages In This Thread
RE: Cracked Hashes Skipped? Mode 2500 WPA/WPA2 - by s3in!c - 02-13-2020, 02:14 PM

Forum Jump:

Users browsing this thread: 1 Guest(s)