08-13-2019, 10:01 PM
08-14-2019, 01:16 AM
(08-13-2019, 10:01 PM)Ar76 Wrote: [ -> ]How do I encrypt a text password into a wpa2 hash. I thought I'd have a go at then decrypting using HC?
Open your routers web interface, change it to have WPA2 TKIP/AES encryption and enter a password. Use tools to obtain the handshake of your own routerĀ and decrypt with hashcat using either PMKID or WPA2 hashmodes.
08-14-2019, 07:44 AM
Is there no way of doing it programmatically, c++ or whatever?
08-14-2019, 09:43 AM
you could use tools/test.pl for this
btw: tools/test.pl is within the hashcat folder (source code), but you also need the perl modules in tools/test_modules/ so I recommend just cloning the hashcat git repo with
Code:
echo hashcatrocks | perl tools/test.pl passthrough 2500 | base64 -d > my.hccapx
btw: tools/test.pl is within the hashcat folder (source code), but you also need the perl modules in tools/test_modules/ so I recommend just cloning the hashcat git repo with
Code:
git clone https://github.com/hashcat/hashcat/
cd hashcat
08-14-2019, 09:47 AM
I assume passthrough is the password if not wheres the password to be encrypted?
08-14-2019, 11:00 AM
In philsmd example the string 'hashcatrocks' is the password. But please, stop using the word encrypt, it hurts.
08-14-2019, 06:33 PM
(08-14-2019, 11:00 AM)atom Wrote: [ -> ]In philsmd example the string 'hashcatrocks' is the password. But please, stop using the word encrypt, it hurts.
So what's the correct terminology?
08-14-2019, 07:16 PM
If I use this generator I get a raw psk key, how would I convert this to a .cap or .hccapx file so it can be understood by HC?
https://www.wireshark.org/tools/wpa-psk.html
https://www.wireshark.org/tools/wpa-psk.html
08-15-2019, 10:30 AM
Take a look at hcxtools and hcxkeys. The suite contains various converters (except converters which are able to flood online hashcrackers with fake hashes). If you would like to learn how it (PBKDF2) works, just do a code walk through the sources:
https://github.com/ZerBea
https://github.com/ZerBea