The other day I had a wireless network packet capture file saved as a .cap file. The ESSID that was displaying via normal aircrack-ng output of the WPA/WPA2 wireless packet capture lead me to believe there was at least one space included in the beginning of the ESSID and likely after the ESSID since it was not processing properly using oclHashcat-plus. I had never run into this before so wasn’t exactly sure the easiest way to figure out the number of spaces so I posed the question in the Freenode aircrack-ng IRC channel and got a couple responses which are noted below as well as instructions following the clearest solution.
I recently had a customer upload a WPA capture to our tools.question-defense.com server which failed immediately. This can happen from time to time and is for a variety of reasons Sometimes if captures does not contain all 4 eapol packets they will fail , and sometimes if a capture has lots of other wifi garbage in the .cap file it can confuse the cracking program. This last time was a new situation. After the fail I analyzed the cap file and determined that the essid was not present in the capture. This is absolutely crucial for the decrypting process. In this short article I will show how I determined the essid was not present and what I did about it.
I have numerous D-Link DCS-950G network cameras and a D-Link DCS-3220 at my house and needed to upgrade the firmware recently to provide some new features on the DCS-950G’s. The DCS-950G is one of the lower end models provided by D-Link however they work fairly well. They lack many features of something like the DCS-3220 such as pan and zoom however upgrading to the DCS-950G 1.08 firmware actually adds a digital zoom feature. Below i describe some of the benefits of upgrading from DCS-950G 1.07 to 1.08 along with the steps actually taken to complete the upgrade.