I got a handshake, but Iím having problem trying to crack the password. The password itís not hard at all. Itís marlene10
I download a dictionary from http://www.churchofwi.org/FileLib/...l-wordlist.zip
I then created a rainbow table using this dictionary:
genpmk -f <9-final-wordlist.txt> -d <hashfile> -s <martin>
I then ran cowpatty:
cowpatty -r <handshake-01.cap> -d <hashfile> -s <martin>
But it ask me to extend the list.
So I modified the dictionary (9-final-wordlist.txt) and added marlene10 which is the WPA password and then I ran the following command:
aircrack-ng -c <handshake-01.cap> -w <9-final-wordlist.txt>
and it did find the key!!!!.
This proof that the handshake itís good. My problem must be with the dictionary??
So I ran jhon the ripper
john --rules -w: <9-final-wordlist.txt> -stdout:63 | aircrack-ng -e <martin> -w - <handshake-01.cap>
but this doesnít work
What should I do to fix my problem???? Thanks in advance
This may be a long shot, but try running the fromdos command on 9-final-wordlist.txt before you use genpmk. This command will ensure you don't have any CR/LF characters at the end of password(s) in the list. CR/LF would definitely screw up the resulting hash file (I'm not sure about JtR).
we're forgetting that you are trying to crack your wpa, so if you can't do it easily then you have a good passkey. Its fun to crack your own stuff but its definatly a positive if you have so much trouble cracking a handshake without having your passkey added to the dicti0nary on purpose.
Wielder of the spoon of doom
Summercon, Toorcon, Defcon, Bsides, Derbycon, Shmoocon oh my
Come hang out with hackers on twitter @gunrunr556