Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Hi diegodieguex.
Nice improvement. Now we can retrieve the ESSID (in ASCII) and the VENDOR information from the hashline. |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-26-2018, 05:24 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Hi sao.
The answer of your question is here:
https://hashcat.net/forum/thread-7717-post-41675.html#pid41675 |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-27-2018, 02:24 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Now, wpa-sec running full PMKID support. The success rate is very good:
https://wpa-sec.stanev.org/?stats |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-27-2018, 06:32 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
To answer the question we need more informations:
Which tools do you use for capturing, conversation and cracking?
How is the commandline of the tools?
Which result do yo expect (exactly)?
Which r... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-31-2018, 09:59 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
$ hcxpcaptool -z hash.16800 -E wordlist -I identitylist -U usernamelist *.pcap
Works on all pcaps, but do not expect good results if
- the pcaps are cleaned
- the pcap are merged and contains ESS... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
09-01-2018, 03:31 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
As diegodieguex noticed, that function is allready in hcxtools (whoismac) implemented. hcxpcaptool is a conversion tool, only. It will show basic informations about the capture file. But I think about... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
09-03-2018, 06:19 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Hi marcou3000.
Mem5 gave you a good advice and I recommend to follow his advice!
hashcat -m 16800 -w 3 82445.16800 -a 3 ?l?l?l?l?l?lt!
should do the job
It's also important to check your atta... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
09-21-2018, 11:29 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
From the WikiDevi:
Supported modes:
STA (Station) mode: supported
IBSS (Ad-Hoc) mode: supported
AP (Master) mode: supported
Mesh (802.11s) mode: supported
P2P mode: supported
Monitor mode: su... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
09-22-2018, 06:31 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
"file or directory not found"
means that there is no file test.pcapng in that directory.
Just do a
$ ls
to see what files are present. |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
09-27-2018, 05:52 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
@Superninja
It is not a good idea to copy hcxtools source and hcxdumptool source into the same directory.
Also it is not a good idea to use this directory as your working directory.
If you are a be... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
09-30-2018, 05:09 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
The Wiki is a good place to get some answers:
https://hashcat.net/wiki/doku.php?id=mask_attack
But keep in mind that this (PBKDF2) is a slow process. A mask only make sense if you know a part of t... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
10-01-2018, 08:09 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
> wanted try, but wpasec accept only cap format.
No! wpa-sec running hcxtools in background.
Accepted formats are: cap, pcap, pcapng and gzip compressed cap, pcap and pcapng.
Just upload your capt... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
10-02-2018, 11:59 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
That's ok. It's just a warning, that you will not get full advantage of your GPU. |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
10-02-2018, 08:15 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
This questions are allready answered:
https://hashcat.net/forum/thread-7717-post-41863.html#pid41863
https://hashcat.net/forum/thread-7717-post-41864.html#pid41864
To understand hcxtools and hcxd... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
10-30-2018, 11:02 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Read errors mean that the pineapple possible not shutting down correctly. We miss the final interface statistics block. It doesn't mean that the hash is uncrackable. To find out, what's going wrong, w... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
11-16-2018, 10:20 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
But both pcapng files are usefull for me. I noticed an issue in combination with mips and will try to fix it. Please give me a few minutes to fix it. v2.pcapng doesn't contain handshakes or PMKIDs. |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
11-17-2018, 12:28 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
No, this PMKIDs belong to this ESSIDs:
Birdy
Slow Wifi
Your target network wasn't captured.
You can run whoismac to get informations about the 16800 hashline:
whoismac -p |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
11-17-2018, 01:27 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
If you want to use hcxdumptool to caputure wlan traffic, please note that your WiFi adapter must support this. Not all drivers support this. This is a list of chipsets, known as working "out of th... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-06-2018, 07:15 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Some statistics:
Session..........: hashcat
Status...........: Quit
Hash.Type........: WPA-PMKID-PBKDF2
Hash.Target......: 16800.txt
Time.Started.....: Wed Aug 8 12:16:43 2018 (10 secs)
Time.... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-08-2018, 12:18 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
octf Wrote: (08-11-2018, 07:21 AM)
--
My testing area has lots of Netgear and TpLink routers. By using either hcxdumptool or wpa_supplicant, I was unable to capture a single PMKID. So the vulnerabi... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-12-2018, 01:34 PM |