WPA Handshake Validator
Drop a WPA capture file in — the tool identifies the format (pcap / pcapng / hccapx / hc22000) and confirms whether it's ready for Hashcat mode 22000. Nothing is uploaded; format detection happens via magic-byte inspection in your browser.
Capture format reference
- .pcap / .cap: standard tcpdump / Wireshark capture. Magic bytes
0xA1B2C3D4. - .pcapng: modern Wireshark and hcxdumptool format. Magic bytes
0x0A0D0D0A. - .hccapx: legacy Hashcat 4.x binary format for mode 2500. Magic bytes
HCPX. Deprecated. - .hc22000: modern Hashcat 6.0+ unified text format for mode 22000. Lines start with
WPA*.
Conversion path
For modern Hashcat (mode 22000), the target format is .hc22000. Conversion path: hcxpcapngtool input.pcapng -o output.hc22000. For legacy .hccapx files: hcxhashtool.
Skip the conversion — use cloud cracking
Upload your .pcap / .pcapng / .hccapx / .hc22000 directly. We convert and run Hashcat 22000 on multi-GPU clusters. Pay only on success.
Run Free Analysis