Quote Originally Posted by Quest View Post
can you look at this please? http://www.exploresecurity.com/willi...action-script/

I will try it.


very interesting:

Code:
root@kali:~# cd /root && ./william.sh Xxxx222.cap Xxxx11.cap
Mode=REVERSE m=1 (second message) n=1 (first message) ignoring duplicates
Using packet 4 as second EAPOL packet
BSSID is 38:60:77:xx:xx:xx
TKIP network identified
Client station is 94:eb:cd:xx:xx:xx
Determined SSID from beacon frame (packet number 1)
The SSID is XXXXXX
There are 1 first messages before the chosen second message
Using packet 2 as first EAPOL packet
Writing packets to Xxxx222.cap
Deleting temp files
Now run "aircrack-ng Xxxx222.cap -w <dictionary_file>"

root@kali:~# pyrit -r Xxxx222.cap analyze
ERROR: could not insert 'nvidia': No such device
Pyrit 0.4.1-dev (svn r308) (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+

Parsing file 'Xxxx222.cap' (1/1)...
Parsed 3 packets (3 802.11-packets), got 1 AP(s)

#1: AccessPoint 38:60:77:xx:xx:xx ('XXXXXX'):
  #1: Station 94:eb:cd:xx:xx:xx, 1 handshake(s):
    #1: HMAC_MD5_RC4, bad, spread 1

root@kali:~# cowpatty -r Xxxx222.cap -c
cowpatty 4.6 - WPA-PSK dictionary attack. <[email protected]>

Collected all necessary data to mount crack against WPA/PSK passphrase.
root@kali:~#
now pyrit and cowpatty don't agree on the output.cap file generated by william.
Are you just trying to clean and convert the .cap file for use with hashcat, if so is it absolutely necessary to clean the .cap file before converting it?.