Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum [desc] Replies Views Posted
    Thread: Cannot capture WPA handshake on macOS by any means
Post: RE: Cannot capture WPA handshake on macOS by any m...

This function is extremely limited on proprietary operating systems. Read more here: https://wiki.wireshark.org/CaptureSetup/WLAN Recommendation: Linux and a WiFi adapter whose driver support mo...
ZerBea General Talk 1 1,135 01-25-2020, 09:57 AM
    Thread: no ssh in pwnagotchi
Post: RE: no ssh in pwnagotchi

"... also ssh file without extension in root dir of sd" is not the correct way. recommended way: https://pwnagotchi.ai/configuration/#about-your-ssh-connection or the raspbian way (if we assume pw...
ZerBea General Talk 3 1,311 03-26-2020, 09:55 AM
    Thread: no ssh in pwnagotchi
Post: RE: no ssh in pwnagotchi

Maybe that is not enough and you're missing some information. Please read more here: https://www.raspberrypi.org/forums/viewtopic.php?t=203716 Code: -- country=xx ctrl_interface=DIR=/var/run/...
ZerBea General Talk 3 1,311 03-27-2020, 09:19 PM
    Thread: Indirect signs of PSK being changed
Post: RE: Indirect signs of PSK being changed

If the old PSK is known, hcxdumptool --weakcandidate will do that. No alert == PSK changed. If the old PSK is known, you can use hcxpcapngtool --all option to identify PSK changes. If ESSID and PSK ...
ZerBea General Talk 2 804 04-04-2020, 08:18 AM
    Thread: Integer overflow detected in keyspace of mask
Post: RE: Integer overflow detected in keyspace of mask

2501 and 16801 hash modes are designed to verify (pre-)calculated PMKs. Latest hashcat use this modes to detect already recovered passwords, by testing the hash against the PMK (take a look at new has...
ZerBea General Talk 7 6,472 04-28-2019, 11:37 AM
    Thread: Handshake timestamps do not match packets no.
Post: RE: Handshake timestamps do not match packets no.

cap2hccapx, hcxpcaptool and hcxpcapng tool calculating EAPOL time values (count time between EAPOL messages), because you can't trust the RC in case of a packet loss (therefore we have nonce-error-cor...
ZerBea General Talk 3 1,474 12-17-2019, 09:24 AM
    Thread: WPA3 Dragonblood Vulnerabilities Disclosure
Post: RE: WPA3 Dragonblood Vulnerabilities Disclosure

How does hcxdumptool work with WPA3? It only detect the AUTHENTICATION. Do you reuse tools from Dragloblood? No, this tools are useless, because they require at least unprivileged access to the v...
ZerBea General Talk 5 3,485 05-15-2020, 10:34 PM
    Thread: WPA2 crackstation
Post: RE: WPA2 crackstation

I'm running this: amd ryzen 1700 msi x370 krait msi gtx 1080 ti aero oc 16 gb g.skill ripjaws v ddr4-3200 Samsung SSD PM961 NVMe 128GB M.2 (arch system) 500 gb samsung evo 850 (data) bequiet ...
ZerBea Hardware 6 8,586 08-01-2017, 01:16 PM
    Thread: WPA2 crackstation
Post: RE: WPA2 crackstation

$ hashcat -m 2500 --benchmark hashcat (v3.6.0-305-g1b835c8f) starting in benchmark mode... OpenCL Platform #1: NVIDIA Corporation ====================================== * Device #1: GeForce GTX 10...
ZerBea Hardware 6 8,586 08-04-2017, 08:37 AM
    Thread: Fritzbox and PMKID is possible?
Post: RE: Fritzbox and PMKID is possible?

The Fritzbox isn't vulnerable. You will not receive a PMKID.
ZerBea Hardware 1 1,239 09-22-2019, 07:12 PM
    Thread: Archer dual band t4u v1 monitor mode
Post: RE: Archer dual band t4u v1 monitor mode

The Fritzbox isn't vulnerable. You will not receive a PMKID.
ZerBea Hardware 5 3,387 09-22-2019, 07:13 PM
    Thread: Archer dual band t4u v1 monitor mode
Post: RE: Archer dual band t4u v1 monitor mode

If the access point is hardened, search for weak clients. Here is an example, of a weak client: https://github.com/ZerBea/hcxtools/issues/112#issuecomment-532537154
ZerBea Hardware 5 3,387 09-23-2019, 11:40 PM
    Thread: Archer dual band t4u v1 monitor mode
Post: RE: Archer dual band t4u v1 monitor mode

According to wikidevi it is not possible, running Linux "out of the box": https://wikidevi.com/wiki/TP-LINK_Archer_T4U You must compile a driver that support monitor mode and packet injection. For...
ZerBea Hardware 5 3,387 09-21-2019, 10:56 AM
    Thread: hccapx Problem
Post: RE: hccapx Problem

cap2hccapx is working fine. As far as I know, handshaker is a script that starts several different tools to capture a handshake. The result is a cleaned cap, containing only a beacon (or proberespo...
ZerBea hashcat 7 10,016 06-24-2017, 07:20 AM
    Thread: hccapx Problem
Post: RE: hccapx Problem

You can use hcxtools to capture. You can use wlancap2hcx to convert. wlancap2hcx will give you a warning that the cap was cleaned, but will convert it (but expect not a good result).
ZerBea hashcat 7 10,016 06-24-2017, 08:44 PM
    Thread: hccapx Problem
Post: RE: hccapx Problem

No problem: wlancap2hcx -x -e wordlist -o test.hccapx *.cap Options: -x -> match exact mac_ap and mac_sta -e -> extract also found passwords and networknames from wlan traffic (will be appended) ...
ZerBea hashcat 7 10,016 06-26-2017, 09:21 PM
    Thread: Epic cracking!
Post: RE: Epic cracking!

Helped me to get a high hitrate: https://en.wikipedia.org/wiki/Intelligence_cycle Cheers
ZerBea hashcat 17 13,870 08-04-2017, 08:32 AM
    Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake

Short answer to your question: Yes, it is possible with latest hashcat! Long statement: But you don't need that tool! Using only M1 and M2 is not a new idea. You can use every combination o...
ZerBea hashcat 8 11,175 08-01-2017, 05:09 PM
    Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake

And please keep in mind: hcxtools and hashcat are "area weapons" against wifi! hashcat (v3.6.0-279-g6946329b) starting... Session..........: hashcat Status...........: Running Hash.Type.........
ZerBea hashcat 8 11,175 08-01-2017, 07:11 PM
    Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake

Well, answering every probe request, makes it possible that a client will try to connect to us. In that case, we are the access point (ap) which the client expected to see. This is an attempt to get t...
ZerBea hashcat 8 11,175 08-01-2017, 11:23 PM