This topic contains 1 reply, has 2 voices, and was last updated by FLoCloudz 1 month, 1 week ago.
- January 21, 2021 at 10:42 am #354136
This is going to be a bit of a lengthy post so please bare with me.
I am trying to figure out how to extract the right hash to decrypt in Hashcat from Kali
I have not found a solution to properly pass through my host GPU into my VM workstation running kali. So when I use Hashcat it will only use my cpu. So what I did was install Hashcat into my host windows 10 OS with a Nvidia 2080.
Within kali I can acquire the 4way handshake with airodump and open the .cap file in wireshark. I filter the eapol and identify the 4way handshake.
**this is where I can’t get a clear answer**
If I wanted to pull the hash I am trying to crack on Hashcat on my host OS what exactly am I using from wireshark? Is it the GTK or the AP NOUNCE that I am trying to crack? Of the 4 pieces of the handshake, exactly what am I going to copy and paste into Hashcat?
I appreciate any info you guys can give me or if anyone else has figured out a good way to psst through your GPU that would be good intel too.
- January 21, 2021 at 10:42 am #354137
When I say copy and paste I mean put into a .txt file on my host OS to run against my word list that is also on my host OS
- January 21, 2021 at 10:42 am #354138
aircrack-ng handshake.cap -J filename
hccap2john filename.hccap > filename
hashcat -O -m2500 -r /usr/share/hashcat/rules/best64.rule -o cracked 15819_1567821904.hccapx rockyou.txt
You must be logged in to reply to this topic.