Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: hashcat 6.0.0
Post: RE: hashcat 6.0.0
Amazing improvements, especially the new WPA fetures. Thanks for coding this great tool.
Cheers
Mike |
|
ZerBea |
hashcat
|
21 |
87,684 |
06-16-2020, 06:03 PM |
|
|
Thread: ATTENTION! OpenCL kernel self-test failed.
Post: RE: ATTENTION! OpenCL kernel self-test failed.
@ philsmd
latest tests of 22000 - WPA-PBKDF2-PMKID+EAPOL are very impressive. 2200x offers many advantages. |
|
ZerBea |
hashcat
|
31 |
12,818 |
12-22-2019, 12:44 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
Hi soxrok2212.
Did a quick binwalk, unsquashfs and radare2 on some files and noticed that the values are retrieved from the board:
ls /sys/module/board/parameters/*.*
or by debugsys --info
squas... |
|
ZerBea |
User Contributions
|
182 |
305,383 |
08-24-2018, 01:33 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
...and if you don't have the default ESSID (with the 4 xdigits, required by the WIFI keygen),
$ hcxpsktool --digit10
will calculate the whole key space , based on wpa-sec analyses (known SEEDs):
$ hc... |
|
ZerBea |
User Contributions
|
182 |
305,383 |
05-16-2020, 10:04 AM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
Maybe you're interested in this (not only ATT):
https://boxnet.servehttp.com/cap/pix/DUMP/
BTW:
You can reduce the key space, if you assume "N0" within every serial number:
dddddN0ddddd
That mak... |
|
ZerBea |
User Contributions
|
182 |
305,383 |
05-20-2020, 09:25 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA using PMKID
Thanks for reporting this issue. I fixed it with the last commit.
We tried to use filterlist entries on the first outgoing broadcast packet. Since there are no incomming packets at this moment, we ru... |
|
ZerBea |
User Contributions
|
187 |
1,293,324 |
08-05-2018, 10:53 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Limitations:
This attack will not work on dynamic calculated PMKs.
You can identify them in your hash file:
MAC_AP, MAC_STA and ESSID are the same, PMKID changed.
In that case an EAPOL 4/4 handsha... |
|
ZerBea |
User Contributions
|
187 |
1,293,324 |
08-08-2018, 12:23 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
And please do not wonder about "802.11q". We added this to the write-up, to see how many people simply copy from one another. So please, forgive us..... |
|
ZerBea |
User Contributions
|
187 |
1,293,324 |
08-08-2018, 12:29 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
I got many issue reports on git regarding K*A*L*I.
For all K*A*L*I users, which are not penetration testers, please read this nice post here (remove the "*" inside the link):
https://unix.stackexch... |
|
ZerBea |
User Contributions
|
187 |
1,293,324 |
08-14-2018, 08:32 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Hi Kangaroot.
You're running an old version. Latest commit is v 4.2.1:
https://github.com/ZerBea/hcxdumptool/commit/95ef2951c5da7eec9d5469d43fc0851522a2d9d0
several bugfixes and new/changed options |
|
ZerBea |
User Contributions
|
187 |
1,293,324 |
08-14-2018, 11:02 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Well, rolling release principle.... |
|
ZerBea |
User Contributions
|
187 |
1,293,324 |
08-15-2018, 10:33 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
This bug was fixed last week! Do you use the latest commit? |
|
ZerBea |
User Contributions
|
187 |
1,293,324 |
08-15-2018, 07:57 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Hi Kangaroot.
Forgot to answer to this:
Although, --enable-status now accepts only one of four options, not all of them as it used to.
-> No, now we use a bitmask.
- you can run --enable-status=1 ... |
|
ZerBea |
User Contributions
|
187 |
1,293,324 |
08-15-2018, 08:00 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
That's interesting:
You received 4 PMKIDs for a single network (I assume that it isn't an ENTERPRISE network). So there must be 4 clients.
How is the commandline for hcxdumptool?
A hashfile shoul... |
|
ZerBea |
User Contributions
|
187 |
1,293,324 |
08-17-2018, 03:40 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Correct. Running hcxdumptool without disable arguments and/or setting a filterlist is the most aggressive mode.
hcxdumptool will run deauthentications against established connections and disassociati... |
|
ZerBea |
User Contributions
|
187 |
1,293,324 |
08-17-2018, 05:46 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
added rcascan (radio assignement scan):
$ hcxdumptool -h
--do_rcascan: show radio channel assignment (scan for target access points)
xxxxxxxxxxxx [CHANNEL 1]
xxxxxxxxxxxx [CHANNEL 7]
xxxxxxxx... |
|
ZerBea |
User Contributions
|
187 |
1,293,324 |
08-19-2018, 01:14 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Hi stinky.
No, that is business as usual: WPA-EAPOL-PBKDF2. If we got only M4 of the handshake, we simply ask for the other key messages to retrieve an authorized handshake. That's all - just another... |
|
ZerBea |
User Contributions
|
187 |
1,293,324 |
08-19-2018, 03:58 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Usually we use panel antennas like this ones:
https://www.logilink.com/Products_LogiLink/Active_Network_Components/Wireless_LAN_Antennas/Wireless_LAN_Antenna_Yagi-directional_14_dBi-Outdoor.htm
https... |
|
ZerBea |
User Contributions
|
187 |
1,293,324 |
08-19-2018, 06:21 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Another driver, tested with hcxdumptool (again Realtek):
https://github.com/kimocoder/rtl8812au/
[35053.423872] usb 5-4.5: Product: Edimax AC600 USB
[35053.423874] usb 5-4.5: Manufacturer: Realte... |
|
ZerBea |
User Contributions
|
187 |
1,293,324 |
08-20-2018, 06:54 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Hi dizcza.
Yes, there is a way. From the README.md:
Notice
Most output files will be appended to existing files (with the exception of .cap files).
You can/should cat all outputs from hcxpcaptool ... |
|
ZerBea |
User Contributions
|
187 |
1,293,324 |
08-26-2018, 03:30 PM |