Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Hi marcou3000.
Mem5 gave you a good advice and I recommend to follow his advice!
hashcat -m 16800 -w 3 82445.16800 -a 3 ?l?l?l?l?l?lt!
should do the job
It's also important to check your atta... |
|
ZerBea |
User Contributions
|
187 |
1,293,321 |
09-21-2018, 11:29 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Hi marcou3000.
There can be different reasons:
1) To much power consumption of an USB high gain adapter (for example AWUS036NH connected to an USP port of a Raspberry PI) - in that case reduce power... |
|
ZerBea |
User Contributions
|
187 |
1,293,321 |
09-22-2018, 10:27 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
hcxhashtool has now a build in test for PSK and/or PMK. To verify that you captured and converted the correct handshake do the following:
$ hcxpcapngtool -o test.22000 your_capfile_here.pcapng
$ hcx... |
|
ZerBea |
User Contributions
|
648 |
487,167 |
01-06-2020, 10:18 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
No, there will be no "all in one tool". The workflow is:
hcxdumptool -> hcxpcapngtool -> hcxhashtool -> (optional hcxpsktool) -> hashcat
Detection of handshakes and PMKIDs is really complex and I ... |
|
ZerBea |
User Contributions
|
648 |
487,167 |
01-08-2020, 09:52 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
In that case, just pipe it:
https://en.wikipedia.org/wiki/Pipeline_(Unix)
$ hashcat --stdout -r rule wordlist
passwor1
passwor2
passwor3
passwor4
wordlist:
passwor
rule
$1
$2
$3
$4
... |
|
ZerBea |
User Contributions
|
648 |
487,167 |
01-12-2020, 06:02 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Read more here:
https://wikidevi.com/wiki/Rtl8xxxu
Supported modes
STA (Station) mode: supported
IBSS (Ad-Hoc) mode: unknown
AP (Master) mode: unknown
Mesh (802.11s) mode: unknown
P2P mode: unk... |
|
ZerBea |
User Contributions
|
187 |
1,293,321 |
09-23-2018, 11:47 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
hcxdumptool update:
added GPSD support (stored as comment in pcapng file)
--use_gpsd : use GPSD to retrieve position
add latitude, lon... |
|
ZerBea |
User Contributions
|
648 |
487,167 |
09-27-2018, 09:39 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Ok, now we know the cause: ath9k_htc driver
I have a TPL-LINK TL-WN722N V1 for testing purpose and it shows the same "ugly" behavior.
$ hcxdumptool -I
wlan interfaces:
f81a6718410f wlp3s0f0u2 (at... |
|
ZerBea |
User Contributions
|
648 |
487,167 |
01-13-2020, 05:43 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
That isn't a dmesg log while hcxdumptool is running. Your log is showing NetworkManager access to the device.
As you can see from my dmesg log:
Jan 13 16:48:10.888795 tux1 kernel: kernel BUG at mm... |
|
ZerBea |
User Contributions
|
648 |
487,167 |
01-13-2020, 05:59 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
hashmode is independent from hcxdumptool. You can use hcxpcangtool on that pcapng files to convert them.
I'm still hunting for that kernel bug, like other coders, too:
https://bugzilla.kernel.org/bu... |
|
ZerBea |
User Contributions
|
648 |
487,167 |
01-13-2020, 06:08 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
As of today, only mt76 and rt2800usb driver families are working without issues. |
|
ZerBea |
User Contributions
|
648 |
487,167 |
01-13-2020, 06:31 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Oh, I think that's a misunderstanding. I'm not talking about wardriving. I'm talking about "normal" laboratory conditions, running different WiFi adapters, router types, antennas and electronic measur... |
|
ZerBea |
User Contributions
|
648 |
487,167 |
01-13-2020, 09:20 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
With the latest update of hcxtools, hcxpcaptool is able to detect a GPS track from hcxpdumptool and convert this track to GPX format (for example accepted by Viking and GPSBabel):
$ hcxpcaptool -h
-... |
|
ZerBea |
User Contributions
|
648 |
487,167 |
09-29-2018, 06:27 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
From this commit on:
https://github.com/ZerBea/hcxdumptool/commit/6b006e022291562b9706f408e01ba2904297846f
hcxdumptool will set the interface to monitor mode.
That means iw, ip, iwconfig and ifconf... |
|
ZerBea |
User Contributions
|
187 |
1,293,321 |
09-30-2018, 05:03 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
No need to run rockyou against your hash. This list is included in the dictionaries of: https://wpa-sec.stanev.org/?dicts
You can upload your cap (using wlancap2wpasec or web interface). If the passw... |
|
ZerBea |
User Contributions
|
187 |
1,293,321 |
10-01-2018, 01:12 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Well, not easy to explain:
https://www.kernel.org/doc/html/v4.17/process/submitting-patches.html
But in simple words, it works like this procedure:
First step is to report an issue (if it is relate... |
|
ZerBea |
User Contributions
|
648 |
487,167 |
01-14-2020, 06:31 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Well, I'm retired, but I am still learning something new, too. |
|
ZerBea |
User Contributions
|
648 |
487,167 |
01-14-2020, 07:18 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Patience....
example:
issue reported: 2019-10-24 08:50:38
https://bugzilla.kernel.org/show_bug.cgi?id=205305
received patch: 2019-10-28 11:59:09
https://bugzilla.kernel.org/show_bug.cgi?id=205305... |
|
ZerBea |
User Contributions
|
648 |
487,167 |
01-14-2020, 07:50 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Don't thank me. That are only the basics.
Next part is to understand RSN-IE and WPA-IE. How do they affect the following EAP authentication.
Why isn't it enough to capture a BEACON and M2M3 (discove... |
|
ZerBea |
User Contributions
|
648 |
487,167 |
01-15-2020, 10:18 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
For sure this attack must fail on a RADIUS server. The authentication is done by the RADIUS authentication server (not by the router). This provides additional security. Various kinds of the Extensibl... |
|
ZerBea |
User Contributions
|
187 |
1,293,321 |
11-07-2018, 06:42 PM |