Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[desc]
|
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Yes, you can do this using wlanhcx2ssid:
$ wlanhcx2ssid -h
wlanhcx2ssid 4.0.2 (C) 2018 ZeroBeat
usage: wlanhcx2ssid
options:
-i : input hccapx file
-p : change directory for o... |
|
ZerBea |
User Contributions
|
648 |
487,212 |
01-30-2018, 02:11 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
No, hash-mode 12000 doesn't reduce the time. PBKDF2 is very, very computationally intensive.
Generating PMKs only makes sense on common ESSIDs like home, HOME, default, etc....
Once calculated (rain... |
|
ZerBea |
User Contributions
|
648 |
487,212 |
01-30-2018, 03:51 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Nice to hear that it works.
BTW: It's not me alone (RealEnder, Atom, Magnum, Neheb, TOXIC, freeroute - they all belong to the team)
Some words about m -12000 in combination with WiFi:
If you h... |
|
ZerBea |
User Contributions
|
648 |
487,212 |
01-30-2018, 06:27 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi sfw10625.
ok, let's answer your questions:
testlist.txt - this list includes all words (1 .. 32 characters) from the SSID field of the management frames
including networknames and passwords (i... |
|
ZerBea |
User Contributions
|
648 |
487,212 |
01-31-2018, 06:39 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
1. Yes: cat test1.hccapx test2.hccapx ..... testn.hccapx > merged.hccapx
No need to remove cracked by hand - just use hashcat -m 2500 in combination with --remove
2. The one you cracked is an una... |
|
ZerBea |
User Contributions
|
648 |
487,212 |
01-31-2018, 10:00 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi JuniorJPDJ.
Nice to see hcxtools on ANDROID. Implementing this additional blacklisting/state for wlandump-ng isn't so easy.
Best way is to use the -F option (add the client or the AP to the BPF).... |
|
ZerBea |
User Contributions
|
648 |
487,212 |
02-05-2018, 11:26 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Well, you're right too. In this case, wlandump-ng and hcxdumptool will work like an intelligent WiFi jammer!
Normally APs and clients use a retry counter (we do the same). Default value is 6 retries,... |
|
ZerBea |
User Contributions
|
648 |
487,212 |
02-06-2018, 08:29 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
If you use the -F (wlancap2hcx) or the -B (hcxpcaptool) option and add all mac_addr from your neighbourhood you don't "destroy" their traffic.
Channel hopping capabilites are limited to the driver an... |
|
ZerBea |
User Contributions
|
648 |
487,212 |
02-06-2018, 10:25 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
All above requests are implemented in hcxdumptool:
user defined scanlist:
-C : comma separated scanlist (1,3,5,7...)
not supported channels are skipped
(BTW: wlandump-ng shows you the last ... |
|
ZerBea |
User Contributions
|
648 |
487,212 |
02-06-2018, 12:23 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
I have been asked to explain this 2 commadlines and the behavior of the tool
hcxdumptool -i -o dumpfile.pcap -B blacklistown1 -c 1 -t 5 -D
-B inside are the mac_ap we do not want to deauthenticat... |
|
ZerBea |
User Contributions
|
648 |
487,212 |
02-06-2018, 06:29 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi hulley.
The main difference between wlandump-ng an hcxdumptool is libpcap.
wlandump-ng use libpcap and hcxdumptool use raw sockets. Using raw sockets is extreme hardware near.
We open three raw ... |
|
ZerBea |
User Contributions
|
648 |
487,212 |
02-11-2018, 01:46 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
I do not want capture this thread, but I have a question:
Do you have some informations about (free)RADIUS, specifically about the packet structure of the Attribute Value Pairs in the Access-Request ... |
|
ZerBea |
hashcat
|
21 |
17,277 |
02-11-2018, 02:05 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi hulley.
Now you can see hcxtools in action, twice:
1)
wpa-sec moved to hashcat >= 4.0.1 and hcxtools >= 4.0.1
The python client (help_crack.py) is updated to version (0.9.0 / 10 Feb 2018)
BT... |
|
ZerBea |
User Contributions
|
648 |
487,212 |
02-11-2018, 06:18 PM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
We are talking about different things.
You can crack a RADIUS password with hashmode -m 4800 (CHAP). But that's only one single variant.
For example: sometimes the password is stored as BASE64(SHA1(... |
|
ZerBea |
hashcat
|
21 |
17,277 |
02-12-2018, 09:34 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi hulley.
Well, the chipsets BCM4311, BCM4312 or BCM4321 require a little more "action" .
As far as I know, they use opensysfs, but I'm not shure. I need some more infos about that interface:
Pl... |
|
ZerBea |
User Contributions
|
648 |
487,212 |
02-12-2018, 11:22 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi hulley.
Thanks for the test. Maybe I should not drop wlandump-ng, but implement all new features from hcxdumptool in there.
So that we have at least 2 different versions (a raw version and a libp... |
|
ZerBea |
User Contributions
|
648 |
487,212 |
02-13-2018, 11:14 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
Also a good idea is to read the RFC docs , even if they are not easy to understand. They are our basic docs if we add new functions to our tools:
https://tools.ietf.org/html/rfcXXXX
where XXXX is t... |
|
ZerBea |
hashcat
|
21 |
17,277 |
02-13-2018, 03:49 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi diegodieguex.
I sent you a mail. Maybe something in your installation is broken. I did a quick run on your caps:
There are many, many clear passwords in the captured files (but only some of them ... |
|
ZerBea |
User Contributions
|
648 |
487,212 |
02-22-2018, 12:50 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Some words about the "Wireless regulatory database for CRDA":
If your device doesn't work, like you expected (not all channels / high not power available), take a look into the wireless regulatory da... |
|
ZerBea |
User Contributions
|
648 |
487,212 |
02-22-2018, 09:56 AM |
|
|
Thread: hashcat v4.1.0
Post: RE: hashcat v4.1.0
Awesome. Great job. Thanks for your big efforts.
Now let us look optimistically into the future: FreeRADIUS, VPN and TLS (and some EAP variants) are on top of the list.
Cheers |
|
ZerBea |
hashcat
|
13 |
32,462 |
02-22-2018, 10:11 AM |