pwnagotchi seems to capture a lot of pcap files that only contain EAPOL message 1 (as can be seen using Wireshark). WPA-SEC does not seem to like these. Are these pcaps in any way helpful for cracking?
As I am new to this, I would appreciate recommendations for tools / scripts that automate the validation of the pcap files. The result should be a folder only containing the pcaps that can actually be used to by WPA-SEC to crack a password.