First of all I'm not sure if this is the right forum category for my thread, so correct me if I'm wrong.
My test network name: MOM1
My pssword : MOM12345
pyrit -e MOM1 -r MOM1.cap -i pass.txt attack_passthrough
cannot find the passkey
pyrit -e MOM1 -i pass.txt -o - passthrough | cowpatty -d - -r MOM1.cap -s MOM1
The PSK is "MOM12345".
I'm in the process of discussing this problem with Lucas Lueg, but it seems his output is different than mine.
Strange thing, that aircrack cannot find the password, and we have different results using Cowpatty 4.6, such as:
cowpatty -f pass.txt -r MOM1.cap -s MOM1 The PSK is "MOM12345".
# cowpatty -f pass.txt -r MOM1.cap -s MOM1
cowpatty 4.6 - WPA-PSK dictionary attack. <firstname.lastname@example.org>
End of pcap capture file, incomplete four-way handshake exchange. Try using a
To reproduce this problem you will need my .cap file. You will find it on author's website along with other info you might find useful. Open Issue 120.
This is my first post, so be gentle with me, please.
Can you post your feedbacks, please?