Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: convert a WPA / WPA2 pcap
Post: RE: convert a WPA / WPA2 pcap
the file name looks like you use a stupid script to capture and prepare wifi traffic!
please read this:
https://hashcat.net/forum/thread-6666-post-35540.html#pid35540 |
|
ZerBea |
General Talk
|
9 |
15,382 |
10-11-2017, 07:41 AM |
|
|
Thread: How to encrypt password with wpa2?
Post: RE: How to encrypt password with wpa2?
Take a look at hcxtools and hcxkeys. The suite contains various converters (except converters which are able to flood online hashcrackers with fake hashes). If you would like to learn how it (PBKDF2) ... |
|
ZerBea |
hashcat
|
9 |
3,127 |
08-15-2019, 10:30 AM |
|
|
Thread: skipping file: (null) (invalid eapol size)
Post: RE: skipping file: (null) (invalid eapol size)
hcxdumptool and hcxtools are working fine on UBUNTU 18.04 (as used here):
https://www.nomotion.net/blog/cracking-wifi-without-clients-pmkid-method/
and they will be official part in next UBUNTU vers... |
|
ZerBea |
hashcat
|
9 |
3,037 |
08-27-2019, 07:31 PM |
|
|
Thread: skipping file: (null) (invalid eapol size)
Post: RE: skipping file: (null) (invalid eapol size)
That are good news. Thanks for the feedback.
Now start to capture (over a long time) and collect hcxpcaptool -E -I -U lists and -o -k hashfiles. At regular intervals run your hashes against this lis... |
|
ZerBea |
hashcat
|
9 |
3,037 |
08-31-2019, 11:14 PM |
|
|
Thread: skipping file: (null) (invalid eapol size)
Post: RE: skipping file: (null) (invalid eapol size)
On the first run, you need some steps to identify a suitable interface, to check driver and to check that packet injection is working. Also you must identify processes that interferes with hcxdumptool... |
|
ZerBea |
hashcat
|
9 |
3,037 |
08-31-2019, 07:48 AM |
|
|
Thread: Speed comparison WPA/WPA2 (2500) vs WPA/WPA2 PMK (2501)
Post: RE: Speed comparison WPA/WPA2 (2500) vs WPA/WPA2 P...
You can't compare 2500 to 2501 and 16800 to 16801.
2500 and 16800 are hash modes to get a PSK, while 2501 and 16801 hash modes are used to verify a given(!) PMK.
BTW:
Both modes 250x and 1680x ar... |
|
ZerBea |
hashcat
|
9 |
4,600 |
01-06-2020, 02:34 PM |
|
|
Thread: Speed comparison WPA/WPA2 (2500) vs WPA/WPA2 PMK (2501)
Post: RE: Speed comparison WPA/WPA2 (2500) vs WPA/WPA2 P...
Speed depend on count of hashes inside the hash file and/or nonce-error-correction value. How have you measured the 20%?
I can't reproduce such a big difference running an example hash from here:
... |
|
ZerBea |
hashcat
|
9 |
4,600 |
03-23-2020, 09:36 AM |
|
|
Thread: Speed comparison WPA/WPA2 (2500) vs WPA/WPA2 PMK (2501)
Post: RE: Speed comparison WPA/WPA2 (2500) vs WPA/WPA2 P...
Great, thanks for posting your result. Some words about nonce error corrections (NC):
NC values have a deep impact on hashcat speed. Within hccapx and 22000 hash records the message pair field is use... |
|
ZerBea |
hashcat
|
9 |
4,600 |
03-23-2020, 03:22 PM |
|
|
Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx
Upload the cap here:
https://wpa-sec.stanev.org/?nets |
|
ZerBea |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
10 |
14,097 |
05-18-2018, 05:56 PM |
|
|
Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx
...or simple use hcxtools for capturing and conversion, as they provide nonce-error-corrections and more...
BTW:
hcxtools running in background of wpa-sec and they did the conversion! |
|
ZerBea |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
10 |
14,097 |
05-19-2018, 09:15 AM |
|
|
Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx
Hi kexec.
That is a typical aircrack capture. You captured 125954 packets (3.949.735 Bytes) for only one unauthorized handshake (tons of useless frames inside).
$ hcxpcaptool -o test.hccapx -E wordl... |
|
ZerBea |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
10 |
14,097 |
05-22-2018, 09:45 AM |
|
|
Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx
Hi kexec.
I see that you successfully converted it to hccapx using hcxpcaptool, so it is a bug in hashcat's cap2hccapx?
hcxpcaptool is completely different to other tools, so it will convert your... |
|
ZerBea |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
10 |
14,097 |
05-23-2018, 08:14 PM |
|
|
Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx
So the problem is that if cap contains a lot of garbage packets, cap2hccapx cant convert it? How to determine which packets are not needed and I can delete them from .cap file?
You can do a cleaning ... |
|
ZerBea |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
10 |
14,097 |
05-23-2018, 10:27 PM |
|
|
Thread: PMKID Generates Wrong ESSID And Password From Hash
Post: RE: PMKID Generates Wrong ESSID And Password From ...
This is very difficult to answer, because your question is very imprecise.
A PMKID is transmitted by the access point (ap) or by a client.
There might be something wrong in your work flow. To g... |
|
ZerBea |
hashcat
|
10 |
3,630 |
06-09-2019, 10:49 AM |
|
|
Thread: PMKID Generates Wrong ESSID And Password From Hash
Post: RE: PMKID Generates Wrong ESSID And Password From ...
Yes you are quite right there, by default, hcxdumptool attacks everything in range.
You can either set a target (by filter option), or remove not wanted hashes by hand (PMKID hash file) or by wlanhcx... |
|
ZerBea |
hashcat
|
10 |
3,630 |
06-09-2019, 06:51 PM |
|
|
Thread: PMKID Generates Wrong ESSID And Password From Hash
Post: RE: PMKID Generates Wrong ESSID And Password From ...
Yes, that is the MAC of the access point. |
|
ZerBea |
hashcat
|
10 |
3,630 |
06-09-2019, 09:34 PM |
|
|
Thread: PMKID Generates Wrong ESSID And Password From Hash
Post: RE: PMKID Generates Wrong ESSID And Password From ...
No problem, you're welcome. |
|
ZerBea |
hashcat
|
10 |
3,630 |
06-09-2019, 10:29 PM |
|
|
Thread: Mode 22000 Bad file descriptor
Post: RE: Mode 22000 Bad file descriptor
Thanks. Now, I understand. Please forgive me - I'm old...
16800 can be used for similar hash types from other sources, too - while 22000 not. 22000 is designed for use on WiFi only. |
|
ZerBea |
hashcat
|
10 |
3,156 |
01-19-2020, 05:44 PM |
|
|
Thread: Mode 22000 Bad file descriptor
Post: RE: Mode 22000 Bad file descriptor
BTW:
This is a nice feature request on the new hashline:
https://github.com/hashcat/hashcat/issues/2290
I'm playing around with latest commit (Atom added this feature). Now it's easy to correlate h... |
|
ZerBea |
hashcat
|
10 |
3,156 |
01-19-2020, 10:55 PM |
|
|
Thread: hashcat v6.1.0
Post: RE: hashcat v6.1.0
Thanks for this update. Good work. |
|
ZerBea |
hashcat
|
10 |
4,017 |
07-28-2020, 01:06 PM |