Redleg101 Posted July 1, 2022 Share Posted July 1, 2022 I am learning to use my WiFi Pineapple and love it so far. I am having a problem cracking a wifi password using the hashcat handshakes captured with my WiFi Pineapple. I have downloaded the handshake capture and saved it in a folder in Kali Linux that I run on VMWare. I have tried using hashcat with the rockyou.txt wordlist but can't get it to work. Not sure what I am doing wrong. I use this command ┌──(kali㉿kali)-[~] └─$ hashcat -a 0 -m 22000 hash.txt rockyou.txt hashcat (v6.2.5) starting OpenCL API (OpenCL 2.0 pocl 1.8 Linux, None+Asserts, RELOC, LLVM 11.1.0, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project] ===================================================================================================================================== * Device #1: pthread-Intel(R) Core(TM) i7-8565U CPU @ 1.80GHz, 6403/12871 MB (2048 MB allocatable), 4MCU Minimum password length supported by kernel: 8 Maximum password length supported by kernel: 63 Hash 'hash.txt': Separator unmatched No hashes loaded. Any advice would be great. Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.