Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [desc] Views Posted
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Hi diegodieguex. Nice improvement. Now we can retrieve the ESSID (in ASCII) and the VENDOR information from the hashline.
ZerBea User Contributions 187 1,293,331 08-26-2018, 05:24 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Hi sao. The answer of your question is here: https://hashcat.net/forum/thread-7717-post-41675.html#pid41675
ZerBea User Contributions 187 1,293,331 08-27-2018, 02:24 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Now, wpa-sec running full PMKID support. ‎The success rate is very good: https://wpa-sec.stanev.org/?stats
ZerBea User Contributions 187 1,293,331 08-27-2018, 06:32 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

To answer the question we need more informations: Which tools do you use for capturing, conversation and cracking? How is the commandline of the tools? Which result do yo expect (exactly)? Which r...
ZerBea User Contributions 187 1,293,331 08-31-2018, 09:59 AM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

$ hcxpcaptool -z hash.16800 -E wordlist -I identitylist -U usernamelist *.pcap Works on all pcaps, but do not expect good results if - the pcaps are cleaned - the pcap are merged and contains ESS...
ZerBea User Contributions 187 1,293,331 09-01-2018, 03:31 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

As diegodieguex noticed, that function is allready in hcxtools (whoismac) implemented. hcxpcaptool is a conversion tool, only. It will show basic informations about the capture file. But I think about...
ZerBea User Contributions 187 1,293,331 09-03-2018, 06:19 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Hi marcou3000. Mem5 gave you a good advice and I recommend to follow his advice! hashcat -m 16800 -w 3 82445.16800 -a 3 ?l?l?l?l?l?lt! should do the job It's also important to check your atta...
ZerBea User Contributions 187 1,293,331 09-21-2018, 11:29 AM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

From the WikiDevi: Supported modes: STA (Station) mode: supported IBSS (Ad-Hoc) mode: supported AP (Master) mode: supported Mesh (802.11s) mode: supported P2P mode: supported Monitor mode: su...
ZerBea User Contributions 187 1,293,331 09-22-2018, 06:31 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

"file or directory not found" means that there is no file test.pcapng in that directory. Just do a $ ls to see what files are present.
ZerBea User Contributions 187 1,293,331 09-27-2018, 05:52 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

@Superninja It is not a good idea to copy hcxtools source and hcxdumptool source into the same directory. Also it is not a good idea to use this directory as your working directory. If you are a be...
ZerBea User Contributions 187 1,293,331 09-30-2018, 05:09 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

The Wiki is a good place to get some answers: https://hashcat.net/wiki/doku.php?id=mask_attack But keep in mind that this (PBKDF2) is a slow process. A mask only make sense if you know a part of t...
ZerBea User Contributions 187 1,293,331 10-01-2018, 08:09 AM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

> wanted try, but wpasec accept only cap format. No! wpa-sec running hcxtools in background. Accepted formats are: cap, pcap, pcapng and gzip compressed cap, pcap and pcapng. Just upload your capt...
ZerBea User Contributions 187 1,293,331 10-02-2018, 11:59 AM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

That's ok. It's just a warning, that you will not get full advantage of your GPU.
ZerBea User Contributions 187 1,293,331 10-02-2018, 08:15 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

This questions are allready answered: https://hashcat.net/forum/thread-7717-post-41863.html#pid41863 https://hashcat.net/forum/thread-7717-post-41864.html#pid41864 To understand hcxtools and hcxd...
ZerBea User Contributions 187 1,293,331 10-30-2018, 11:02 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Read errors mean that the pineapple possible not shutting down correctly. We miss the final interface statistics block. It doesn't mean that the hash is uncrackable. To find out, what's going wrong, w...
ZerBea User Contributions 187 1,293,331 11-16-2018, 10:20 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

But both pcapng files are usefull for me. I noticed an issue in combination with mips and will try to fix it. Please give me a few minutes to fix it. v2.pcapng doesn't contain handshakes or PMKIDs.
ZerBea User Contributions 187 1,293,331 11-17-2018, 12:28 AM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

No, this PMKIDs belong to this ESSIDs: Birdy Slow Wifi Your target network wasn't captured. You can run whoismac to get informations about the 16800 hashline: whoismac -p
ZerBea User Contributions 187 1,293,331 11-17-2018, 01:27 AM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

If you want to use hcxdumptool to caputure wlan traffic, please note that your WiFi adapter must support this. ‎Not all drivers support this. This is a list of chipsets, known as working "out of th...
ZerBea User Contributions 187 1,293,331 08-06-2018, 07:15 AM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Some statistics: Session..........: hashcat Status...........: Quit Hash.Type........: WPA-PMKID-PBKDF2 Hash.Target......: 16800.txt Time.Started.....: Wed Aug 8 12:16:43 2018 (10 secs) Time....
ZerBea User Contributions 187 1,293,331 08-08-2018, 12:18 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

octf Wrote: (08-11-2018, 07:21 AM) -- My testing area has lots of Netgear and TpLink routers.  By using either hcxdumptool or wpa_supplicant, I was unable to capture a single PMKID. So the vulnerabi...
ZerBea User Contributions 187 1,293,331 08-12-2018, 01:34 PM