Runs in your browser only

WPA Handshake Validator

Drop a WPA capture file in — the tool identifies the format (pcap / pcapng / hccapx / hc22000) and confirms whether it's ready for Hashcat mode 22000. Nothing is uploaded; format detection happens via magic-byte inspection in your browser.

Capture format reference

  • .pcap / .cap: standard tcpdump / Wireshark capture. Magic bytes 0xA1B2C3D4.
  • .pcapng: modern Wireshark and hcxdumptool format. Magic bytes 0x0A0D0D0A.
  • .hccapx: legacy Hashcat 4.x binary format for mode 2500. Magic bytes HCPX. Deprecated.
  • .hc22000: modern Hashcat 6.0+ unified text format for mode 22000. Lines start with WPA*.

Conversion path

For modern Hashcat (mode 22000), the target format is .hc22000. Conversion path: hcxpcapngtool input.pcapng -o output.hc22000. For legacy .hccapx files: hcxhashtool.

Skip the conversion — use cloud cracking

Upload your .pcap / .pcapng / .hccapx / .hc22000 directly. We convert and run Hashcat 22000 on multi-GPU clusters. Pay only on success.

Run Free Analysis