Hashcat separator unmatched ошибка

Good morning, below is the issue I have been having and can’t seem to figure it out.

I have followed the directions in this YouTube video https://www.youtube.com/watch?v=J8A8rKFZW-M&t=526s

I searched posts on here for an answer and the only error I found was that I using -m 2500 instead of -m 22000

Any ideas would be greatly appreciated.

Thank you

C:hashcat-6.2.5>hashcat.exe -m 22000 -a3 wpa2.hccapx ?d?d?d?d?d?d?d?d?d
hashcat (v6.2.5) starting

Successfully initialized NVIDIA CUDA library.

Failed to initialize NVIDIA RTC library.

* Device #1: CUDA SDK Toolkit not installed or incorrectly installed.
            CUDA SDK Toolkit required for proper device support and utilization.
            Falling back to OpenCL runtime.

* Device #1: WARNING! Kernel exec timeout is not disabled.
            This may cause «CL_OUT_OF_RESOURCES» or related errors.
            To disable the timeout, see: https://hashcat.net/q/timeoutpatch
nvmlDeviceGetFanSpeed(): Not Supported

OpenCL API (OpenCL 1.2 CUDA 11.1.114) — Platform #1 [NVIDIA Corporation]
========================================================================
* Device #1: GeForce RTX 2070 with Max-Q Design, 7168/8192 MB (2048 MB allocatable), 36MCU

OpenCL API (OpenCL 2.1 ) — Platform #2 [Intel(R) Corporation]
=============================================================
* Device #2: Intel(R) UHD Graphics, 13024/26135 MB (2047 MB allocatable), 24MCU

Minimum password length supported by kernel: 8
Maximum password length supported by kernel: 63

Hashfile ‘wpa2.hccapx’ on line 1 (HCPX♦): Separator unmatched
Hashfile ‘wpa2.hccapx’ on line 2 (): Separator unmatched
Hashfile ‘wpa2.hccapx’ on line 3 (ä╚Ƶ¼ì=E1│⌡ƒ╩%╗9◄Xzσ╚╡▼░[7┴): Separator unmatched
∩±Zif┘╦ktcÇ↓y): Separator unmatchedc┐♫òíFd‼¬╔
Hashfile ‘wpa2.hccapx’ on line 5 (): Separator unmatched
∩±Zif┘╦ktcÇ↓): Separator unmatchedφc┐♫òíFd‼¬╔
Hashfile ‘wpa2.hccapx’ on line 7 (`U→φ(♀⌐╗▐í-]K░ÿ►E┤Ü↕î7y┌t¥←─_ÿ↕): Separator unmatched
Hashfile ‘wpa2.hccapx’ on line 8 (): Separator unmatched
Hashfile ‘wpa2.hccapx’ on line 9 (`U→φ(♀⌐╗▐í-]K░ÿ►E┤Ü↕î7y┌t¥←─_ÿ↕): Separator unmatched
Hashfile ‘wpa2.hccapx’ on line 10 (): Separator unmatched
Hashfile ‘wpa2.hccapx’ on line 11 (): Separator unmatched
Hashfile ‘wpa2.hccapx’ on line 12 (): Separator unmatched
No hashes loaded.

Started: Fri Jan 07 09:12:39 2022
Stopped: Fri Jan 07 09:12:41 2022

Posts: 938
Threads: 2
Joined: Jun 2017

01-07-2022, 04:42 PM
(This post was last modified: 01-07-2022, 07:46 PM by ZerBea.)

Hash formats 250x and 1680x are deprecated. Successor is hash mode 22000 which use a new hash format (not longer binary hccapx)

Please read more here:
https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2

here:
https://hashcat.net/forum/thread-10544.h…=separator

here:
https://hashcat.net/forum/thread-10441.h…=separator

or this forum search for hash mode 22000:
https://hashcat.net/forum/search.php?act…order=desc

The online converter moved to the new hash format, too:
https://hashcat.net/cap2hashcat/

and forget all ancient youtube video tutorials.
If you have more questions regarding the new hash format, feel free to ask.

Posts: 2
Threads: 1
Joined: Jan 2022

Thank you, that info helped me get it running.

I wasn’t sure how to tell if it was using the CPU or GPU.  I have an RTX 2070, it took almost an hour to run.  The command output said ‘Failed to initialize NVIDIA RTC library.’  Wasn’t sure what that meant.

I found the example hashes page; however, I’m not sure how it works.  Is that something I can use to test my system to see if it is set up correctly since my session failed/exhausted without retrieving a password?

Session……….: hashcat
Status………..: Exhausted
Hash.Mode……..: 22000 (WPA-PBKDF2-PMKID+EAPOL)
Hash.Target……: 27279_1641567199.hc22000
Time.Started…..: Fri Jan 07 10:22:11 2022 (46 mins, 56 secs)
Time.Estimated…: Fri Jan 07 11:09:07 2022 (0 secs)
Kernel.Feature…: Pure Kernel
Guess.Mask…….: ?d?d?d?d?d?d?d?d?d [9]
Guess.Queue……: 1/1 (100.00%)
Speed.#1………:  333.2 kH/s (0.75ms) @ Accel:32 Loops:256 Thr:64 Vec:1
Speed.#2………:    7679 H/s (5.96ms) @ Accel:4 Loops:16 Thr:128 Vec:1
Speed.#*………:  340.8 kH/s
Recovered……..: 0/1 (0.00%) Digests
Progress………: 1000000000/1000000000 (100.00%)
Rejected………: 0/1000000000 (0.00%)
Restore.Point….: 99852288/100000000 (99.85%)
Restore.Sub.#1…: Salt:0 Amplifier:9-10 Iteration:0-1
Restore.Sub.#2…: Salt:0 Amplifier:9-10 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1….: 646173973 -> 676464973
Candidates.#2….: 623451649 -> 637893737
Hardware.Mon.#1..: Temp: 65c Util:  0% Core: 900MHz Mem:5409MHz Bus:16
Hardware.Mon.#2..: N/A

Started: Fri Jan 07 10:22:07 2022
Stopped: Fri Jan 07 11:09:09 2022

Posts: 938
Threads: 2
Joined: Jun 2017

01-08-2022, 09:54 PM
(This post was last modified: 01-09-2022, 10:41 AM by ZerBea.)

I’m glad I could be of help.

The example hashes are useful to test your system, as mentioned here:
https://hashcat.net/forum/thread-10553-p…l#pid54456

Code:

$ hashcat -m 22000 "WPA*01*4d4fe7aac3a2cecab195321ceb99a7d0*fc690c158264*f4747f87f9f4*686173686361742d6573736964***" -a 3 hashcat!
hashcat (v6.2.5-52-g806257f2e) starting

4d4fe7aac3a2cecab195321ceb99a7d0:fc690c158264:f4747f87f9f4:hashcat-essid:hashcat!

                                                          
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL)
Hash.Target......: 4d4fe7aac3a2cecab195321ceb99a7d0:fc690c158264:f4747...-essid
Time.Started.....: Thu Jan  6 07:32:28 2022 (0 secs)
Time.Estimated...: Thu Jan  6 07:32:28 2022 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Mask.......: hashcat! [8]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:       35 H/s (0.74ms) @ Accel:64 Loops:256 Thr:32 Vec:1
Recovered........: 1/1 (100.00%) Digests
Progress.........: 1/1 (100.00%)
Rejected.........: 0/1 (0.00%)
Restore.Point....: 0/1 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: hashcat! -> hashcat!
Hardware.Mon.#1..: Temp: 32c Util:  7% Core:1770MHz Mem:3500MHz Bus:8

Started: Thu Jan  6 07:32:26 2022
Stopped: Thu Jan  6 07:32:30 2022

To get benefit of CUDA, it is mandatory to install the CUDA SDK toolkit, which is not the case on your system (warning 1)
Additional you have to disable the Kernel exec timeout, which is also not the case on your system (warning 2).

How to do this depend on your operating system. Regarding the screenshots, it looks like you’re running Windows.
I’m on Arch Linux, so I can’t answer this question.

Speed.#1 = your GPU running OpenCL
Speed.#2 = your CPU integrated UHD graphics running OpenCL

hashcat -I option will give you a detailed information (in my case NVIDIA CUDA and OpenCL installed):

Code:

$ hashcat -I
hashcat (v6.2.5-98-g79f3145a4) starting in backend information mode

CUDA Info:
==========

CUDA.Version.: 11.5

Backend Device ID #1 (Alias: #2)
  Name...........: NVIDIA GeForce GTX 1080 Ti
  Processor(s)...: 28
  Clock..........: 1620
  Memory.Total...: 11175 MB
  Memory.Free....: 5747 MB
  Local.Memory...: 48 KB
  PCI.Addr.BDFe..: 0000:26:00.0

OpenCL Info:
============

OpenCL Platform ID #1
  Vendor..: NVIDIA Corporation
  Name....: NVIDIA CUDA
  Version.: OpenCL 3.0 CUDA 11.5.103

  Backend Device ID #2 (Alias: #1)
    Type...........: GPU
    Vendor.ID......: 32
    Vendor.........: NVIDIA Corporation
    Name...........: NVIDIA GeForce GTX 1080 Ti
    Version........: OpenCL 3.0 CUDA
    Processor(s)...: 28
    Clock..........: 1620
    Memory.Total...: 11175 MB (limited to 2793 MB allocatable in one block)
    Memory.Free....: 5696 MB
    Local.Memory...: 48 KB
    OpenCL.Version.: OpenCL C 1.2
    Driver.Version.: 495.46
    PCI.Addr.BDF...: 26:00.0

BTW:
The success rate of hashcat depends on the attack vector and the quality of the dump file. If you received some ERRORs or WARNINGs during conversion of the dump file, it is a good idea to reconsider your attack vector and/or to re-capture the traffic.

I’m trying to crack the password Ul1234 using hashcat. I created a user with that password in kali and copied the hash in the shadow folder:

nils:$6$3q88Up7LX1RFIlRU$gVzo1NvtuV4SmJ2SNv6mcLLc9rWtzNsI6u3TKEkKVXb3gNQKhcK/C6y1DW6q4ODNIJrjf1ondgZ7RHqD7kprI1:18296:0:99999:7:::

So the hash should be :

$6$3q88Up7LX1RFIlRU$gVzo1NvtuV4SmJ2SNv6mcLLc9rWtzNsI6u3TKEkKVXb3gNQKhcK/C6y1DW6q4ODNIJrjf1ondgZ7RHqD7kprI1

i copied the hash into file nils2.txt and typed the following command:

kali@kali:~/Documents$ hashcat -m 1800 -a 3 ?u?l?d?d?d?d -o ans.txt --force nils2.txt
hashcat (v5.1.0) starting...

OpenCL Platform #1: The pocl project
====================================
* Device #1: pthread-Intel(R) Core(TM) i5-7360U CPU @ 2.30GHz, 1024/2955 MB allocatable, 2MCU

Hash '?u?l?d?d?d?d': Separator unmatched
No hashes loaded.

Started: Wed Feb  5 09:08:13 2020
Stopped: Wed Feb  5 09:08:14 2020

I don’t understand why I’m getting an error

I have error «separator unmatched» when trying to use handshake hccapx with hashcat mode 22000
I generated the file using my own access point.

PS F:hashcat-6.2.4> hashcat -m 22000 capture1.hccapx wordlist.txt
hashcat (v6.2.4) starting

Successfully initialized NVIDIA CUDA library.


* Device #1: CUDA SDK Toolkit not installed or incorrectly installed.
             CUDA SDK Toolkit required for proper device support and utilization.
             Falling back to OpenCL runtime.

* Device #1: WARNING! Kernel exec timeout is not disabled.
             This may cause "CL_OUT_OF_RESOURCES" or related errors.
             To disable the timeout, see: https://hashcat.net/q/timeoutpatch
nvmlDeviceGetFanSpeed(): Not Supported

OpenCL API (OpenCL 3.0 CUDA 11.4.125) - Platform #1 [NVIDIA Corporation]
========================================================================
* Device #1: NVIDIA GeForce GTX 1660 Ti, 5376/6144 MB (1536 MB allocatable), 24MCU

OpenCL API (OpenCL 2.1 ) - Platform #2 [Intel(R) Corporation]
=============================================================
* Device #2: Intel(R) UHD Graphics 630, 1568/3214 MB (803 MB allocatable), 24MCU

Minimum password length supported by kernel: 8
Maximum password length supported by kernel: 63

Hashfile 'capture1.hccapx' on line 1 (HCPX♦): Separator unmatched
Hashfile 'capture1.hccapx' on line 2 ("·↑úæF┬m▒∟#◄∟ å/╧èû∞$): Separator unmatched
Hashfile 'capture1.hccapx' on line 3 (): Separator unmatched
No hashes loaded.

Started: Mon Sep 06 12:42:23 2021
Stopped: Mon Sep 06 12:42:24 2021

I am trying to get this hash:

633c097a37b26c0caad3b435b51404e

with the following command:

hashcat -a 0 -m 1800 -o final.txt hash.txt /usr/share/wordlists/rockyou.txt

But it gives me an error saying my separator is unmatched.

I’m new to this so I’m not exactly sure what that means or how I can fix it …

Moaz El-sawaf's user avatar

asked Apr 28, 2022 at 3:55

jollycrobot's user avatar

The hash you are trying with is of type MD5, so you have to specify the correct hash type for the hash mode flag -m, which is 0 for the MD5, so it should be -m 0 instead of -m 1800 which is used for sha512crypt $6$, SHA512 (Unix) 2.

Refer to this link from the official documentation of hashcat which provides examples for all the has types.

answered Apr 28, 2022 at 4:07

Moaz El-sawaf's user avatar

Moaz El-sawafMoaz El-sawaf

2,0661 gold badge14 silver badges28 bronze badges

irl

I don’t know how to do it in crunch, but I just wrote a python script for you that will do it.
from random import shuffle, randint
from sys import argv

charset = [‘A’,’B’,’C’,’D’,’E’,’F’,’G’,’H’,’I’,’J’,’K’,’L’,’M’,’N’,’O’,’P’,’Q’,’R’,’S’,’T’,’U’,’V’,’W’,’X’,’Y’,’Z’,’0′,’1′,’2′,’3′,’4′,’5′,’6′,’7′,’8′,’8′,’9′]

if __name__ == «__main__»:
if len(argv) < 2:
print(«Error: please use like this:npython rand_pass.py <number_of_passwords>»)
else:
num_pass = argv[1]
passes = []
counter = 0
while counter < int(num_pass):
num_chars = 0
num_nums = 0
passwd = «»
i = 0
while len(passwd) < 10:
c = charset[randint(0,len(charset)-1)]
if num_nums < 6 and c.isnumeric():
num_nums += 1
passwd += c
elif num_chars < 6 and not c.isnumeric():
num_chars += 1
passwd += c
i += 1
passes.append(passwd)
print(passwd)
counter += 1

Usage:
python file_name_gen_pass.py
«`

It will generate num_pass passwords randomly via a list shuffle and tracking the number of chars/nums. You can refine it probably to reduce false positives but it if you are just doing some baseline brute force testing this should be sufficient to prove your point to a stakeholder.
Edit:
Wrote a C++ implementation for you to appease everyone :)
#include <iostream>
#include <vector>
#include <random>
#include <string>

const char charset[] = {‘A’,’B’,’C’,’D’,’E’,’F’,’G’,’H’,’I’,’J’,’K’,’L’,’M’,’N’,’O’,’P’,’Q’,’R’,’S’,’T’,’U’,’V’,’W’,’X’,’Y’,’Z’,’0′,’1′,’2′,’3′,’4′,’5′,’6′,’7′,’8′,’8′,’9′};
int main()
{

std::cout << «Please enter the number of passwords to generate here: «;
int num_pass;
std::cin >> num_pass;
std::random_device dev;
std::mt19937_64 rng(dev());
std::vector<std::string> passwds;
std::uniform_int_distribution<std::mt19937_64::result_type> dist(0, sizeof(charset) — 1);

for (int i = 0; i < num_pass; ++i) {
std::string pass = «»;
int num_nums = 0, num_chars = 0;
while (pass.length() < 10) {
char c = charset[dist(rng)];
if (isdigit(c) && num_nums < 6) {
pass += c;
num_nums++;
}
else if (isalpha(c) && num_chars < 6) {
pass += c;
num_chars++;
}
}
passwds.push_back(pass);
std::cout << pass << std::endl;
}
std::cin.get();
}

Just run it, enter the amount of passwords to generate and it’ll fire off. It’s pretty fast for small amounts. Just run it like so:
gen_pass.exe > pass.txt
Then open that file and remove the first line and run this command: awk ‘!seen[$0]++’ script.py

Возможно, вам также будет интересно:

  • Harvia электропечь для сауны ошибки
  • Harvia ошибка error 3
  • Harvia ошибка er 3 устранение
  • Harvia xafir cs110 ошибка е3
  • Harvia e9 ошибка ремонт

  • Понравилась статья? Поделить с друзьями:
    0 0 голоса
    Рейтинг статьи
    Подписаться
    Уведомить о
    guest

    0 комментариев
    Старые
    Новые Популярные
    Межтекстовые Отзывы
    Посмотреть все комментарии