Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Cannot capture WPA handshake on macOS by any means
Post: RE: Cannot capture WPA handshake on macOS by any m...
This function is extremely limited on proprietary operating systems.
Read more here:
https://wiki.wireshark.org/CaptureSetup/WLAN
Recommendation:
Linux and a WiFi adapter whose driver support mo... |
|
ZerBea |
General Talk
|
1 |
1,135 |
01-25-2020, 09:57 AM |
|
|
Thread: no ssh in pwnagotchi
Post: RE: no ssh in pwnagotchi
"... also ssh file without extension in root dir of sd"
is not the correct way.
recommended way:
https://pwnagotchi.ai/configuration/#about-your-ssh-connection
or the raspbian way (if we assume pw... |
|
ZerBea |
General Talk
|
3 |
1,311 |
03-26-2020, 09:55 AM |
|
|
Thread: no ssh in pwnagotchi
Post: RE: no ssh in pwnagotchi
Maybe that is not enough and you're missing some information.
Please read more here:
https://www.raspberrypi.org/forums/viewtopic.php?t=203716
Code:
--
country=xx
ctrl_interface=DIR=/var/run/... |
|
ZerBea |
General Talk
|
3 |
1,311 |
03-27-2020, 09:19 PM |
|
|
Thread: Indirect signs of PSK being changed
Post: RE: Indirect signs of PSK being changed
If the old PSK is known, hcxdumptool --weakcandidate will do that. No alert == PSK changed.
If the old PSK is known, you can use hcxpcapngtool --all option to identify PSK changes.
If ESSID and PSK ... |
|
ZerBea |
General Talk
|
2 |
804 |
04-04-2020, 08:18 AM |
|
|
Thread: Integer overflow detected in keyspace of mask
Post: RE: Integer overflow detected in keyspace of mask
2501 and 16801 hash modes are designed to verify (pre-)calculated PMKs. Latest hashcat use this modes to detect already recovered passwords, by testing the hash against the PMK (take a look at new has... |
|
ZerBea |
General Talk
|
7 |
6,472 |
04-28-2019, 11:37 AM |
|
|
Thread: Handshake timestamps do not match packets no.
Post: RE: Handshake timestamps do not match packets no.
cap2hccapx, hcxpcaptool and hcxpcapng tool calculating EAPOL time values (count time between EAPOL messages), because you can't trust the RC in case of a packet loss (therefore we have nonce-error-cor... |
|
ZerBea |
General Talk
|
3 |
1,474 |
12-17-2019, 09:24 AM |
|
|
Thread: WPA3 Dragonblood Vulnerabilities Disclosure
Post: RE: WPA3 Dragonblood Vulnerabilities Disclosure
How does hcxdumptool work with WPA3?
It only detect the AUTHENTICATION.
Do you reuse tools from Dragloblood?
No, this tools are useless, because they require at least unprivileged access to the v... |
|
ZerBea |
General Talk
|
5 |
3,485 |
05-15-2020, 10:34 PM |
|
|
Thread: WPA2 crackstation
Post: RE: WPA2 crackstation
I'm running this:
amd ryzen 1700
msi x370 krait
msi gtx 1080 ti aero oc
16 gb g.skill ripjaws v ddr4-3200
Samsung SSD PM961 NVMe 128GB M.2 (arch system)
500 gb samsung evo 850 (data)
bequiet ... |
|
ZerBea |
Hardware
|
6 |
8,586 |
08-01-2017, 01:16 PM |
|
|
Thread: WPA2 crackstation
Post: RE: WPA2 crackstation
$ hashcat -m 2500 --benchmark
hashcat (v3.6.0-305-g1b835c8f) starting in benchmark mode...
OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: GeForce GTX 10... |
|
ZerBea |
Hardware
|
6 |
8,586 |
08-04-2017, 08:37 AM |
|
|
Thread: Fritzbox and PMKID is possible?
Post: RE: Fritzbox and PMKID is possible?
The Fritzbox isn't vulnerable. You will not receive a PMKID. |
|
ZerBea |
Hardware
|
1 |
1,239 |
09-22-2019, 07:12 PM |
|
|
Thread: Archer dual band t4u v1 monitor mode
Post: RE: Archer dual band t4u v1 monitor mode
The Fritzbox isn't vulnerable. You will not receive a PMKID. |
|
ZerBea |
Hardware
|
5 |
3,387 |
09-22-2019, 07:13 PM |
|
|
Thread: Archer dual band t4u v1 monitor mode
Post: RE: Archer dual band t4u v1 monitor mode
If the access point is hardened, search for weak clients.
Here is an example, of a weak client:
https://github.com/ZerBea/hcxtools/issues/112#issuecomment-532537154 |
|
ZerBea |
Hardware
|
5 |
3,387 |
09-23-2019, 11:40 PM |
|
|
Thread: Archer dual band t4u v1 monitor mode
Post: RE: Archer dual band t4u v1 monitor mode
According to wikidevi it is not possible, running Linux "out of the box":
https://wikidevi.com/wiki/TP-LINK_Archer_T4U
You must compile a driver that support monitor mode and packet injection. For... |
|
ZerBea |
Hardware
|
5 |
3,387 |
09-21-2019, 10:56 AM |
|
|
Thread: hccapx Problem
Post: RE: hccapx Problem
cap2hccapx is working fine.
As far as I know, handshaker is a script that starts
several different tools to capture a handshake.
The result is a cleaned cap, containing only a beacon (or proberespo... |
|
ZerBea |
hashcat
|
7 |
10,016 |
06-24-2017, 07:20 AM |
|
|
Thread: hccapx Problem
Post: RE: hccapx Problem
You can use hcxtools to capture.
You can use wlancap2hcx to convert.
wlancap2hcx will give you a warning that the cap was cleaned, but will convert it (but expect not a good result). |
|
ZerBea |
hashcat
|
7 |
10,016 |
06-24-2017, 08:44 PM |
|
|
Thread: hccapx Problem
Post: RE: hccapx Problem
No problem:
wlancap2hcx -x -e wordlist -o test.hccapx *.cap
Options:
-x -> match exact mac_ap and mac_sta
-e -> extract also found passwords and networknames from wlan traffic (will be appended)
... |
|
ZerBea |
hashcat
|
7 |
10,016 |
06-26-2017, 09:21 PM |
|
|
Thread: Epic cracking!
Post: RE: Epic cracking!
Helped me to get a high hitrate:
https://en.wikipedia.org/wiki/Intelligence_cycle
Cheers |
|
ZerBea |
hashcat
|
17 |
13,870 |
08-04-2017, 08:32 AM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
Short answer to your question:
Yes, it is possible with latest hashcat!
Long statement:
But you don't need that tool!
Using only M1 and M2 is not a new idea.
You can use every combination o... |
|
ZerBea |
hashcat
|
8 |
11,175 |
08-01-2017, 05:09 PM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
And please keep in mind:
hcxtools and hashcat are "area weapons" against wifi!
hashcat (v3.6.0-279-g6946329b) starting...
Session..........: hashcat
Status...........: Running
Hash.Type......... |
|
ZerBea |
hashcat
|
8 |
11,175 |
08-01-2017, 07:11 PM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
Well, answering every probe request, makes it possible that a client will try to connect to us. In that case, we are the access point (ap) which the client expected to see. This is an attempt to get t... |
|
ZerBea |
hashcat
|
8 |
11,175 |
08-01-2017, 11:23 PM |