Results 1 to 2 of 2

Thread: Using Crackstation.Net for a WPA2 Handshake File

  1. #1
    Junior Member
    Join Date
    Jan 2015

    Using Crackstation.Net for a WPA2 Handshake File

    I have a wpa2 handshake file that I obtained from my lab environment using the latest version of Fluxion. I do not have any rainbow tables or word lists on my Raspberry Pi 3 for obvious reasons with storage space.

    I came across a website today called and it looks promising. However, from what I have read online, and if I understand what I read correctly, I need to find the hash of the .cap file. Is that correct? This particular website has the abilty to handle up to 20 different hashes.

    Then I was doing some further reading on I read about converting the .cap file to a .hccap file so Hashcat can crack the key. It appears I need the BSSID and the .cap file to come up with a hash. Is it that hash that I can then upload to the website?

    Has anyone ever used that page for the purpose of cracking a wifi password?

  2. #2
    Senior Member
    Join Date
    Dec 2016
    You got the right way getting the hash but you need to keep searching to understand the words. BSSID is the mac address of the AP and it is written in each packet between station and AP during the 4-way handshake.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts