Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
I don't think it's a driver issue and I don't think it's a pineapple issue, because use received a PMKID from the access point!
1) check your environment
identify your access point (ESSID and mac)... |
|
ZerBea |
User Contributions
|
187 |
1,293,338 |
11-18-2018, 08:26 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Due to several big endian fixes, hcxdumptool and hcxtools moved to v 5.0.1.
I received a notice that they are running on OpenWRT.
But keep in mind:
Both, PMKID attack vector and AP-LESS attack vect... |
|
ZerBea |
User Contributions
|
187 |
1,293,338 |
11-27-2018, 08:48 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
small notice about hcxpcaptool option -I:
hcxdumptool is able to request identities from a client (for example the International Mobile Subscriber Identity [IMSI] Number from a mobile phone). Running... |
|
ZerBea |
User Contributions
|
648 |
487,343 |
02-04-2019, 07:58 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
That depend on the environment variables of your system.
$ getconf ARG_MAX
2097152
I haven't tested it exactly , because I have not so much entries.
BTW:
It is allowed to use BPFC and filterm... |
|
ZerBea |
User Contributions
|
648 |
487,343 |
03-18-2020, 11:09 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
According to hashcat, hcxdumptool and hcxtools moved to v5.1.0
hcxdumptool:
several on big endian fixes (reported to run on OpenWRT)
improved channel sitching (detect driver capabilities and skip... |
|
ZerBea |
User Contributions
|
648 |
487,343 |
12-05-2018, 11:42 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi ciccio17.
According to the documentation of the standard, the length of an SSID should be a maximum of 32 characters (32 octets, normally ASCII letters and digits, though the standard itself doesn... |
|
ZerBea |
User Contributions
|
648 |
487,343 |
03-22-2019, 10:02 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi strike1953.
2 ways:
less strict: add MAC_AP to filterlist.txt
hcxdumptool --filterlist_ap=filterlist.txt --filtermode=2 ...
strict: create bpfc
Code:
--
$ hcxdumptool -m
$ tcpdump -i w... |
|
ZerBea |
User Contributions
|
648 |
487,343 |
04-07-2020, 08:11 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Difference between the two methods:
filtermode:
all CLIENTs handled (inclusive the ones running MAC randomization)
bpfc:
limited to CLIENTs connected to the AP.
you will receive a warning (hcxpca... |
|
ZerBea |
User Contributions
|
648 |
487,343 |
04-08-2020, 08:07 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Nice to hear that. Thanks. |
|
ZerBea |
User Contributions
|
648 |
487,343 |
05-12-2020, 12:33 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
...and if you don't have the default ESSID (with the 4 xdigits, required by the WIFI keygen),
$ hcxpsktool --digit10
will calculate the whole key space , based on wpa-sec analyses (known SEEDs):
$ hc... |
|
ZerBea |
User Contributions
|
182 |
305,386 |
05-16-2020, 10:04 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
You can retrieve a PSK or a PMK only from a weak client. Therefore you must run hcxdumptool over a long time against your penetration target.
We can not distinguish between an ESSID, a damaged ESSID,... |
|
ZerBea |
User Contributions
|
648 |
487,343 |
04-10-2019, 09:51 AM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
Maybe you're interested in this (not only ATT):
https://boxnet.servehttp.com/cap/pix/DUMP/
BTW:
You can reduce the key space, if you assume "N0" within every serial number:
dddddN0ddddd
That mak... |
|
ZerBea |
User Contributions
|
182 |
305,386 |
05-20-2020, 09:25 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
24h is good, but you should do that on different days and or different month, too.
Let me say a few words about hcx-suite:
The suite is designed as an analysis suite. All attack vectors run on raw... |
|
ZerBea |
User Contributions
|
648 |
487,343 |
04-10-2019, 11:55 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
That depends on how many clients are in range.
Here is an example:
https://github.com/ZerBea/hcxtools/issues/92#issuecomment-497603848
Running less than 2h and feeded the result of -E to hashcat ... |
|
ZerBea |
User Contributions
|
648 |
487,343 |
06-02-2019, 03:41 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
-E, -I and -U collecting data from the WLAN traffic and store them as ASCII text files. The idea is to use this lists as wordlists for hashcat.
For example, if a user confused something when he types... |
|
ZerBea |
User Contributions
|
648 |
487,343 |
06-02-2019, 04:59 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Nice to hear that.
Unfortunately driver was broken on other kernel versions for a few months:
https://bugzilla.kernel.org/show_bug.cgi?id=208579
https://bugzilla.kernel.org/show_bug.cgi?id=208577
... |
|
ZerBea |
User Contributions
|
648 |
487,343 |
09-15-2020, 10:02 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Great.
It will take a while until you build up your environment / database, but it's worth it. The more clients, the better your lists.
Most of the tools feeding https://wpa-sec.stanev.org/ with dat... |
|
ZerBea |
User Contributions
|
648 |
487,343 |
06-02-2019, 11:58 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Running hcxpcaptool to convert EAPOL (-o) and PMKID (-k or -z) is fine.
The content of -E is very interesting, because we can find several passwords (PSK) inside. You should know, that
hcxdumptool... |
|
ZerBea |
User Contributions
|
648 |
487,343 |
06-04-2019, 08:18 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
hcxpcaptool doing hexify in the same way like hashcat. If we have non ASCII characters inside the traffic, we do a conversion to HEX-ASCII, too. hashcat understand this and will try this values as PSK... |
|
ZerBea |
User Contributions
|
648 |
487,343 |
06-04-2019, 06:03 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
You should do both (convert to .2500 and .16800) and run -E and -I list on them.
But, yes, it make more sense to run -E and -I against .2500
It also depends on what you want. Let's run through the... |
|
ZerBea |
User Contributions
|
648 |
487,343 |
06-04-2019, 08:15 PM |