Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
@Superninja
It is not a good idea to copy hcxtools source and hcxdumptool source into the same directory.
Also it is not a good idea to use this directory as your working directory.
If you are a be... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
09-30-2018, 05:09 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
If you use the -F (wlancap2hcx) or the -B (hcxpcaptool) option and add all mac_addr from your neighbourhood you don't "destroy" their traffic.
Channel hopping capabilites are limited to the driver an... |
|
ZerBea |
User Contributions
|
648 |
487,315 |
02-06-2018, 10:25 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
All above requests are implemented in hcxdumptool:
user defined scanlist:
-C : comma separated scanlist (1,3,5,7...)
not supported channels are skipped
(BTW: wlandump-ng shows you the last ... |
|
ZerBea |
User Contributions
|
648 |
487,315 |
02-06-2018, 12:23 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
I have been asked to explain this 2 commadlines and the behavior of the tool
hcxdumptool -i -o dumpfile.pcap -B blacklistown1 -c 1 -t 5 -D
-B inside are the mac_ap we do not want to deauthenticat... |
|
ZerBea |
User Contributions
|
648 |
487,315 |
02-06-2018, 06:29 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
The Wiki is a good place to get some answers:
https://hashcat.net/wiki/doku.php?id=mask_attack
But keep in mind that this (PBKDF2) is a slow process. A mask only make sense if you know a part of t... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
10-01-2018, 08:09 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
> wanted try, but wpasec accept only cap format.
No! wpa-sec running hcxtools in background.
Accepted formats are: cap, pcap, pcapng and gzip compressed cap, pcap and pcapng.
Just upload your capt... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
10-02-2018, 11:59 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi hulley.
The main difference between wlandump-ng an hcxdumptool is libpcap.
wlandump-ng use libpcap and hcxdumptool use raw sockets. Using raw sockets is extreme hardware near.
We open three raw ... |
|
ZerBea |
User Contributions
|
648 |
487,315 |
02-11-2018, 01:46 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi hulley.
Now you can see hcxtools in action, twice:
1)
wpa-sec moved to hashcat >= 4.0.1 and hcxtools >= 4.0.1
The python client (help_crack.py) is updated to version (0.9.0 / 10 Feb 2018)
BT... |
|
ZerBea |
User Contributions
|
648 |
487,315 |
02-11-2018, 06:18 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
hcxdumptool retrieve the GPS data from GPSD in json format. So every device mentioned here as working, should work:
https://www.catb.org/gpsd/hardware.html
For my tests I run an "AktivePilot JENTRO B... |
|
ZerBea |
User Contributions
|
648 |
487,315 |
10-02-2018, 08:13 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
That's ok. It's just a warning, that you will not get full advantage of your GPU. |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
10-02-2018, 08:15 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
This questions are allready answered:
https://hashcat.net/forum/thread-7717-post-41863.html#pid41863
https://hashcat.net/forum/thread-7717-post-41864.html#pid41864
To understand hcxtools and hcxd... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
10-30-2018, 11:02 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Read errors mean that the pineapple possible not shutting down correctly. We miss the final interface statistics block. It doesn't mean that the hash is uncrackable. To find out, what's going wrong, w... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
11-16-2018, 10:20 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi diegodieguex.
I sent you a mail. Maybe something in your installation is broken. I did a quick run on your caps:
There are many, many clear passwords in the captured files (but only some of them ... |
|
ZerBea |
User Contributions
|
648 |
487,315 |
02-22-2018, 12:50 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Some words about the "Wireless regulatory database for CRDA":
If your device doesn't work, like you expected (not all channels / high not power available), take a look into the wireless regulatory da... |
|
ZerBea |
User Contributions
|
648 |
487,315 |
02-22-2018, 09:56 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi diegodieguex.
I splitted the repository:
https://github.com/ZerBea/hcxtools (see changelog)
https://github.com/ZerBea/hcxkeys (the OpenCL stuff)
https://github.com/ZerBea/hcxdumptool (see chang... |
|
ZerBea |
User Contributions
|
648 |
487,315 |
02-26-2018, 11:59 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
But both pcapng files are usefull for me. I noticed an issue in combination with mips and will try to fix it. Please give me a few minutes to fix it. v2.pcapng doesn't contain handshakes or PMKIDs. |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
11-17-2018, 12:28 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
No, this PMKIDs belong to this ESSIDs:
Birdy
Slow Wifi
Your target network wasn't captured.
You can run whoismac to get informations about the 16800 hashline:
whoismac -p |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
11-17-2018, 01:27 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Looks like hcxdumptool, hcxtools (and hcxkeys) are not installed.
Do a git clone and satisfy dependencies (see README.md). Then run "make install".
Read more here:
https://github.com/ZerBea/hcxtool... |
|
ZerBea |
User Contributions
|
648 |
487,315 |
12-06-2018, 09:04 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
hcxdumptool moved to version 4.1.5
With lots of help from RealEnder, chron0 and rofl0r the tool is complete refactored:
- improved scan engine
- improved authentication engine (incl. Radio Measur... |
|
ZerBea |
User Contributions
|
648 |
487,315 |
03-02-2018, 01:44 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
One of the major problems is to find a good wordlist and to filter out the garbage from that wordlist.
For that purpose you can try hashcat in combination with the new python client from
https://w... |
|
ZerBea |
User Contributions
|
648 |
487,315 |
03-07-2018, 11:29 PM |