I have installed aircrack-in and pyrit.
Code:
root@kali:~# aircrack-ng
Aircrack-ng 1.2 rc4 - (C) 2006-2015 Thomas d'Otreppe
http://www.aircrack-ng.org
usage: aircrack-ng [options] <.cap / .ivs file(s)>
[...]
root@kali:~# pyrit selftest
Pyrit 0.5.1 (C) 2008-2011 Lukas Lueg - 2015 John Mora
https://github.com/JPaulMora/Pyrit
This code is distributed under the GNU General Public License v3+
Cores incorporated in the test:
CPUs:
#1: 'CPU-Core (SSE2)'
#2: 'CPU-Core (SSE2)'
GPUs:
Running selftest...
All results verified. Your installation seems OK
root@kali:~#
I also have captured a handshake. And aircrack-ng pleased with him.
Code:
root@kali:~# aircrack-ng kluge.cap
Opening kluge.cap
Read 3 packets.
# BSSID ESSID Encryption
1 XX:XX:XX:XX:XX:XX kluge WPA (1 handshake)
Choosing first network as target.
Opening kluge.cap
Please specify a dictionary (option -w).
Quitting aircrack-ng...
root@kluge:~#
But pyrite says that it is bad.
Code:
root@kali:~# pyrit -r kluge.cap analyze
Pyrit 0.5.1 (C) 2008-2011 Lukas Lueg - 2015 John Mora
https://github.com/JPaulMora/Pyrit
This code is distributed under the GNU General Public License v3+
Parsing file 'kluge.cap' (1/1)...
Parsed 3 packets (3 802.11-packets), got 1 AP(s)
#1: AccessPoint XX:XX:XX:XX:XX:XX ('kluge'):
#1: Station YY:YY:YY:YY:YY:YY, 1 handshake(s):
#1: HMAC_SHA1_AES, bad, spread 1
root@kali:~#
What is the problem? This handshake bad or pyrite something wrong?
kluge.