Page 1 of 2 12 LastLast
Results 1 to 10 of 15

Thread: AIrcrack + >2gb dict files

  1. #1
    Just burned his ISO
    Join Date
    May 2007
    Posts
    20

    Default AIrcrack + >2gb dict files

    Does anybody else run into the restriction of a 2gb dictionary file when using Aircrack? I'm running of the USB BT3 live option but have a 500gb ext3 sata drive I'm performing all my work with. I have a wordlist I generated with crunch and Aircrack reports "Empty dictionary." I also compiled some of Xploit's lists into a single file that's 6 gigs and get the same thing. Any dic files under 2gb seem to work fine.

    Any help?

  2. #2

    Default

    Quote Originally Posted by wylde342 View Post
    Does anybody else run into the restriction of a 2gb dictionary file when using Aircrack? I'm running of the USB BT3 live option but have a 500gb ext3 sata drive I'm performing all my work with. I have a wordlist I generated with crunch and Aircrack reports "Empty dictionary." I also compiled some of Xploit's lists into a single file that's 6 gigs and get the same thing. Any dic files under 2gb seem to work fine.

    Any help?
    can you post your commands EXACTLY so we can see what it is your typing & where your going wrong?

  3. #3
    Just burned his ISO
    Join Date
    May 2007
    Posts
    20

    Default

    (brute .txt is a 140gig dict)

    head brute.txt (just to show it's valid)
    bt sdc1 # head brute.txt
    11111111
    11111112
    11111113
    11111114
    11111115
    11111116
    11111117
    11111118
    11111119
    11111110


    bt sdc1 # aircrack-ng -w brute.txt -a 2 -b 00:13:46:87:B1:CC wpa-01.cap
    Empty dictionnary
    Empty dictionnary
    Please specify a dictionary (option -w).

    ??

  4. #4

    Default

    Quote Originally Posted by wylde342 View Post
    (brute .txt is a 140gig dict)

    head brute.txt (just to show it's valid)
    bt sdc1 # head brute.txt
    11111111
    11111112
    11111113
    11111114
    11111115
    11111116
    11111117
    11111118
    11111119
    11111110


    bt sdc1 # aircrack-ng -w brute.txt -a 2 -b 00:13:46:87:B1:CC wpa-01.cap
    Empty dictionnary
    Empty dictionnary
    Please specify a dictionary (option -w).

    ??
    mmm..... Can you try
    aircrack-ng -w brute.txt *.cap
    also, make sure that your brute.txt is in your SAME directory as your wpa-01.cap files

    1 more thing, can you try create a test.txt password file with YOUR KEY IN IT & try the same but the 'test.txt' instead of the brute.txt also ensuring its in same directory

  5. #5
    Just burned his ISO
    Join Date
    May 2007
    Posts
    20

    Default

    Test 1 - this got a "bit" further:

    bt sdc1 # aircrack-ng -w brute.txt *.cap
    Empty dictionnary
    Empty dictionnary
    Opening flesch-01.cap
    Read 3037 packets.

    # BSSID ESSID Encryption

    1 00:13:46:87:B1:CC flesch WPA (1 handshake)

    Choosing first network as target.

    Opening flesch-01.cap
    Please specify a dictionary (option -w).


    Quitting aircrack-ng...

    Does this point to anything?

  6. #6
    Just burned his ISO
    Join Date
    May 2007
    Posts
    20

    Default

    Just ran the aircrack-ng with a 3mb dic file in the directory and it worked just fine.

  7. #7

    Default

    Quote Originally Posted by wylde342 View Post
    Just ran the aircrack-ng with a 3mb dic file in the directory and it worked just fine.
    You never stated it was WPA you we're trying to crack
    Was any of my commands helpful?
    What did you type to get it working?

  8. #8
    Just burned his ISO
    Join Date
    May 2007
    Posts
    20

    Default

    I'm sorry - you're right; I wasn't clear.

    On test 1, when running with*.cap rather than exact filename, it got a little further where it lists the SSID, but still bailed on the dictionary.

    On test 2, I simply ran the same exact command with a 3mb dictionary and it worked fine.

    I believe the issue to be with files larger than 2gigs. It sucks because I've got some nice BIG wordlists I'd like to avoid having to split.

  9. #9

    Default

    Quote Originally Posted by wylde342 View Post
    I'm sorry - you're right; I wasn't clear.

    On test 1, when running with*.cap rather than exact filename, it got a little further where it lists the SSID, but still bailed on the dictionary.

    On test 2, I simply ran the same exact command with a 3mb dictionary and it worked fine.

    I believe the issue to be with files larger than 2gigs. It sucks because I've got some nice BIG wordlists I'd like to avoid having to split.
    it shouldn't matter on how big/small your pass list

    but with your 2gigs, what does this consist of? what is the smallest lenght password & largest length? if your using it for WPA do you know it has to be more than 8chars & less than 63? Just an FYI if you didnt already know

  10. #10
    Just burned his ISO
    Join Date
    May 2007
    Posts
    20

    Default

    Yeah - the list I have, brute.txt, is 8min 8max a-z 0-9 . That's what I don't get?

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •