Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...

hcxtools are part of Arch Linux distribution. https://www.archlinux.org/packages/?q=hcx the same also applies for hashcat and hashcat-utils https://www.archlinux.org/packages/?q=hashcat and NV...
ZerBea User Contributions 648 487,291 08-18-2018, 10:44 AM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Correct. Running hcxdumptool without disable arguments and/or setting a filterlist is the most aggressive mode. hcxdumptool will run deauthentications against established connections and disassociati...
ZerBea User Contributions 187 1,293,331 08-17-2018, 05:46 PM
    Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...

small update hcxpcaptool: detect NETWORK EAP authentication system and Wilibox specific authentication fields: $ hcxpcaptool -V test.pcapng start reading from test.pcapng Summary:           �...
ZerBea User Contributions 648 487,291 08-17-2018, 03:46 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

That's interesting: You received 4 PMKIDs for a single network (I assume that it isn't an ENTERPRISE network). So there must be 4 clients. How is the commandline for hcxdumptool? A hashfile shoul...
ZerBea User Contributions 187 1,293,331 08-17-2018, 03:40 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

hcxdumptool is able to run different attack vectors. And the client-less (PMKID) attack vector is only one of them: ap-less: Only one packet (M2) from a client required. You do not need to hunt fo...
ZerBea User Contributions 187 1,293,331 08-17-2018, 10:51 AM
    Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...

Running hcxdumptool on Android isn't trivial and rooting the device and/or using a custom ROM (for example LINEAGE) isn't enough. Read more here: https://github.com/seemoo-lab/nexmon
ZerBea User Contributions 648 487,291 08-17-2018, 10:14 AM
    Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...

...many ways lead to Rome. You can split your hccapx file with split (a single record is 393 bytes) and use cut to merge them. https://stackoverflow.com/questions/2016894/how-to-split-a-large-text-f...
ZerBea User Contributions 648 487,291 08-16-2018, 05:48 PM
    Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...

Hi chribonn. Pull request to support Android came from here: https://github.com/JuniorJPDJ and should be answered by JuniorJPDJ.
ZerBea User Contributions 648 487,291 08-16-2018, 02:34 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

That are some good news. Well, UBUNTU is recommended by hashcat team and is an easy to use distribution. I share that opinion. Designed for complete novices, UBUNTU teaches a beginner everything he n...
ZerBea User Contributions 187 1,293,331 08-16-2018, 02:19 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Well, it is a new attack vector and a nice playground. Take a look at the statistics of a typical hcxdumptool pcapng file. I got this one from a tester: summary: file name....................:...
ZerBea User Contributions 187 1,293,331 08-16-2018, 10:05 AM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Hi Kangaroot. Forgot to answer to this: Although, --enable-status now accepts only one of four options, not all of them as it used to. -> No, now we use a bitmask. - you can run --enable-status=1 ...
ZerBea User Contributions 187 1,293,331 08-15-2018, 08:00 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

This bug was fixed last week! Do you use the latest commit?
ZerBea User Contributions 187 1,293,331 08-15-2018, 07:57 PM
    Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...

How did you learn so much about wireless authentication and the associated attacks? -> 35 years cryptanalysis and traffic analysis.
ZerBea User Contributions 648 487,291 08-15-2018, 12:52 PM
    Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...

Hi recombinant are you accepting pull requests? -> yes, but under the restrictions of README.md: - Multiple stand-alone binaries - designed to run on  Arch Linux. - All of these utils are desig...
ZerBea User Contributions 648 487,291 08-15-2018, 10:35 AM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Well, rolling release principle....
ZerBea User Contributions 187 1,293,331 08-15-2018, 10:33 AM
    Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...

Hi SIMBA_1983. My question is: if the crack speed is the same for both 2500 and 16800 modes then hashcat does the same mathematical calculations for both formats, right? -> 16800 is a little bit fa...
ZerBea User Contributions 648 487,291 08-15-2018, 08:46 AM
    Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...

Hi recombinant. Does stanev's wpa-sec site support the PMKID derived from the recent PMKID attack, or is it only going to show networks that have the handshake captured? -> wpa-sec is working on ...
ZerBea User Contributions 648 487,291 08-14-2018, 11:45 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Hi Kangaroot. You're running an old version. Latest commit is v 4.2.1: https://github.com/ZerBea/hcxdumptool/commit/95ef2951c5da7eec9d5469d43fc0851522a2d9d0 several bugfixes and new/changed options
ZerBea User Contributions 187 1,293,331 08-14-2018, 11:02 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

I got many issue reports on git regarding K*A*L*I. For all K*A*L*I users, which are not penetration testers, please read this nice post here (remove the "*" inside the link): https://unix.stackexch...
ZerBea User Contributions 187 1,293,331 08-14-2018, 08:32 AM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Well, it doesn't make sense to attack dynamically derived PMKs, but it's really funny. I did a small update on hcxtools. Download example cap from here: https://wiki.wireshark.org/SampleCaptures...
ZerBea User Contributions 187 1,293,331 08-13-2018, 11:25 PM