Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Nice to hear that.
Unfortunately driver was broken on other kernel versions for a few months:
https://bugzilla.kernel.org/show_bug.cgi?id=208579
https://bugzilla.kernel.org/show_bug.cgi?id=208577
... |
|
ZerBea |
User Contributions
|
648 |
486,439 |
09-15-2020, 10:02 PM |
|
|
Thread: potfile wpa format/derivation
Post: RE: potfile wpa format/derivation
As mentioned in this thread:
https://hashcat.net/forum/thread-6661-post-47931.html#pid47931
22000 format is no longer binary. All bash tools (cat, sort, awk, cut, ....) are working on it, on the pot... |
|
ZerBea |
hashcat
|
6 |
406 |
09-15-2020, 06:43 PM |
|
|
Thread: potfile wpa format/derivation
Post: RE: potfile wpa format/derivation
You can read more about this format (2200x, outfile format and potfile format) and the tools working on it here:
https://hashcat.net/forum/thread-6661-post-47931.html#pid47931 |
|
ZerBea |
hashcat
|
6 |
406 |
09-15-2020, 01:27 PM |
|
|
Thread: Hashcat 6.1.1 Upgrade Broke My Install
Post: RE: Hashcat 6.1.1 Upgrade Broke My Install
Glad to hear that.
Most of the problems (nearly all) are related to old distribution versions (inclusive old drivers), broken package system or misconfiguration (inexperienced Linux users). Luckily t... |
|
ZerBea |
hashcat
|
4 |
914 |
08-15-2020, 05:01 PM |
|
|
Thread: Hashcat 6.1.1 Upgrade Broke My Install
Post: RE: Hashcat 6.1.1 Upgrade Broke My Install
remove
$HOME/.nv
$HOME/.hashcat
and try again.
BTW:
Your CUDA API (CUDA 9.1) is very, very old - we are on CUDA 11 and NVIDIA 450.57
Code:
--
$ hashcat -I
hashcat (v6.1.1-20-gdc9a2468) s... |
|
ZerBea |
hashcat
|
4 |
914 |
08-10-2020, 08:40 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Here you will get some good additional information:
https://www.siliceo.es/en/classification-of-the-best-chip-wifi-powerful-for-adapters-usb-features-and-compatibilities/
https://www.siliceo.es/en/t... |
|
ZerBea |
User Contributions
|
648 |
486,439 |
07-29-2020, 08:40 AM |
|
|
Thread: hashcat v6.1.0
Post: RE: hashcat v6.1.0
Thanks for this update. Good work. |
|
ZerBea |
hashcat
|
10 |
4,010 |
07-28-2020, 01:06 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
That depend on the wireless driver (must support full monitor mode, full packet injection and ioctl() system calls).
At last the Atheros driver (ath9k) was completely broken:
https://bugzilla.kernel... |
|
ZerBea |
User Contributions
|
648 |
486,439 |
07-23-2020, 08:18 AM |
|
|
Thread: please help me i am a newbie
Post: RE: please help me i am a newbie
One of the major advantages of the new hash format (-m 22000) is, that it is not binary (hccapx) and every bash tool will work in it.
To get the ESSID in ASCII you can use hcxtools (whoismac):
Code... |
|
ZerBea |
hashcat
|
4 |
871 |
07-22-2020, 11:41 AM |
|
|
Thread: please help me i am a newbie
Post: RE: please help me i am a newbie
According to the help menu, you have to use either
--filtermode=2 in combination with --filterlist_ap=yourtargetmaclist
or create a Berkeley Packet Filter (attack MAC)
Code:
--
--filterlist_ap=... |
|
ZerBea |
hashcat
|
4 |
871 |
07-20-2020, 09:17 AM |
|
|
Thread: Anyone with a amd/radeon GPU rig running on linux?
Post: RE: Anyone with a amd/radeon GPU rig running on li...
Please add this to list of cons: Ancient/limited kernel versions and very limited distributions
https://github.com/RadeonOpenCompute/ROCm#supported-operating-systems
kernel 4.15, kernel 4.18 and ker... |
|
ZerBea |
hashcat
|
5 |
994 |
07-11-2020, 10:14 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
hcxdumptool try to attack the ACCESS POINT (AP) by transmitting several requests and capture the whole traffic. That depend on the options, you selected.
If the AP respond to the requests, we retriev... |
|
ZerBea |
User Contributions
|
648 |
486,439 |
06-24-2020, 12:37 PM |
|
|
Thread: hashcat 6.0.0
Post: RE: hashcat 6.0.0
Amazing improvements, especially the new WPA fetures. Thanks for coding this great tool.
Cheers
Mike |
|
ZerBea |
hashcat
|
21 |
87,674 |
06-16-2020, 06:03 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
The whole filter stuff was refactored:
Now we have filtermode (0, 1, 2) in combination with filterlist_ap (ACCESS POINTs) and filterlist_client (CLIENTs).
That is much faster than filtering ACCESS P... |
|
ZerBea |
User Contributions
|
648 |
486,439 |
05-23-2020, 01:59 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
Maybe you're interested in this (not only ATT):
https://boxnet.servehttp.com/cap/pix/DUMP/
BTW:
You can reduce the key space, if you assume "N0" within every serial number:
dddddN0ddddd
That mak... |
|
ZerBea |
User Contributions
|
182 |
305,126 |
05-20-2020, 09:25 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Very well observed.
We don't want to flood the terminal with duplicated messages. So every combination AP - ESSID is only displayed once on first occurrence. Some CLIENTs randomize their MACs - that... |
|
ZerBea |
User Contributions
|
648 |
486,439 |
05-19-2020, 07:54 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
...and if you don't have the default ESSID (with the 4 xdigits, required by the WIFI keygen),
$ hcxpsktool --digit10
will calculate the whole key space , based on wpa-sec analyses (known SEEDs):
$ hc... |
|
ZerBea |
User Contributions
|
182 |
305,126 |
05-16-2020, 10:04 AM |
|
|
Thread: WPA3 Dragonblood Vulnerabilities Disclosure
Post: RE: WPA3 Dragonblood Vulnerabilities Disclosure
How does hcxdumptool work with WPA3?
It only detect the AUTHENTICATION.
Do you reuse tools from Dragloblood?
No, this tools are useless, because they require at least unprivileged access to the v... |
|
ZerBea |
General Talk
|
5 |
3,482 |
05-15-2020, 10:34 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
No, because we have to stay much longer on the channel do do this.
Besides:
AUTHENTICATION REQUEST, AUTHENTICATION RESPONSE,
ASSOCIATION REQUEST, ASSOCIATIONREPONSE
(each of them followed by an AC... |
|
ZerBea |
User Contributions
|
648 |
486,439 |
05-14-2020, 08:15 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
We have an initial start value for MAC_AP and MAC_STA:
Code:
--
$ sudo hcxdumptool -i wlp39s0f3u3u1u2
initialization...
start capturing (stop with ctrl+c)
NMEA 0183 SENTENCE........: N/A
INTERFACE... |
|
ZerBea |
User Contributions
|
648 |
486,439 |
05-13-2020, 08:42 AM |