Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
Short answer to your question:
Yes, it is possible with latest hashcat!
Long statement:
But you don't need that tool!
Using only M1 and M2 is not a new idea.
You can use every combination o... |
|
ZerBea |
hashcat
|
8 |
11,183 |
08-01-2017, 05:09 PM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
And please keep in mind:
hcxtools and hashcat are "area weapons" against wifi!
hashcat (v3.6.0-279-g6946329b) starting...
Session..........: hashcat
Status...........: Running
Hash.Type......... |
|
ZerBea |
hashcat
|
8 |
11,183 |
08-01-2017, 07:11 PM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
Well, answering every probe request, makes it possible that a client will try to connect to us. In that case, we are the access point (ap) which the client expected to see. This is an attempt to get t... |
|
ZerBea |
hashcat
|
8 |
11,183 |
08-01-2017, 11:23 PM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
ThiagoAlvarenga Wrote: (08-02-2017, 04:48 AM)
--
This is my first post, if I'm posting from the wrong place, to the administrators, move to the correct location and accept my apologies.
My native ... |
|
ZerBea |
hashcat
|
8 |
11,183 |
08-02-2017, 07:10 AM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
braxxox Wrote: (08-02-2017, 03:22 AM)
--
The -b option (beaconing on the last 10 probes) will seduce clients which do not send probes, yet, to probe us and then to connect us.
I'm having a bit ... |
|
ZerBea |
hashcat
|
8 |
11,183 |
08-02-2017, 06:54 AM |
|
|
Thread: WPA/WPA2 batch processing
Post: RE: WPA/WPA2 batch processing
Working on hashfile.16800 is easy to handle (much easier than working on hccapx files), as it is a txt file.
That means, every bash command is working on that file.
For example: get all ESSIDs with ... |
|
ZerBea |
hashcat
|
8 |
5,348 |
09-27-2018, 10:58 AM |
|
|
Thread: WPA/WPA2 batch processing
Post: RE: WPA/WPA2 batch processing
Ok, now I know what you mean with "batch processing". That is aircrack-ng and/or pyrit style.
hashcats provides this feature with hashmode 2501 (for hccapx) and 16801 for (PMKID).
In both cases you ... |
|
ZerBea |
hashcat
|
8 |
5,348 |
09-27-2018, 03:15 PM |
|
|
Thread: WPA/WPA2 batch processing
Post: RE: WPA/WPA2 batch processing
Great, 99% of your workflow is ok.
A valid PMK file includes only PMKs:
181ad8169bf942af7d05a3cbd4f200f5f958ea8db4b5a768e17c716a30f61ff5
d99893b4593b3abc4c1179bd70c6244072ae4521047d4c449ecf90e8b2... |
|
ZerBea |
hashcat
|
8 |
5,348 |
09-27-2018, 05:21 PM |
|
|
Thread: hccapx Problem
Post: RE: hccapx Problem
cap2hccapx is working fine.
As far as I know, handshaker is a script that starts
several different tools to capture a handshake.
The result is a cleaned cap, containing only a beacon (or proberespo... |
|
ZerBea |
hashcat
|
7 |
10,026 |
06-24-2017, 07:20 AM |
|
|
Thread: hccapx Problem
Post: RE: hccapx Problem
You can use hcxtools to capture.
You can use wlancap2hcx to convert.
wlancap2hcx will give you a warning that the cap was cleaned, but will convert it (but expect not a good result). |
|
ZerBea |
hashcat
|
7 |
10,026 |
06-24-2017, 08:44 PM |
|
|
Thread: hccapx Problem
Post: RE: hccapx Problem
No problem:
wlancap2hcx -x -e wordlist -o test.hccapx *.cap
Options:
-x -> match exact mac_ap and mac_sta
-e -> extract also found passwords and networknames from wlan traffic (will be appended)
... |
|
ZerBea |
hashcat
|
7 |
10,026 |
06-26-2017, 09:21 PM |
|
|
Thread: help with android wpa store
Post: RE: help with android wpa store
Hi ware55.
use hashcat hashmode -m 12000
and read basic information (how-to) here:
https://hashcat.net/forum/thread-6661-post-35846.html#pid35846
In case of an ANDROID hotspot default password... |
|
ZerBea |
hashcat
|
7 |
6,779 |
12-17-2017, 11:28 AM |
|
|
Thread: help with android wpa store
Post: RE: help with android wpa store
Hi ware55.
As this depends on your cell phone and your Android Version, it's a question to ask in this forum:
https://forum.xda-developers.com |
|
ZerBea |
hashcat
|
7 |
6,779 |
12-20-2017, 06:26 PM |
|
|
Thread: help with android wpa store
Post: RE: help with android wpa store
Thanks for the additional informations. Now I understand what you mean.
Well, I assume
- you use a SAMSUNG ANDROID device (?)
- you have secure storage activated (?)
- your device is rooted (?)
... |
|
ZerBea |
hashcat
|
7 |
6,779 |
12-17-2017, 05:15 PM |
|
|
Thread: help with android wpa store
Post: RE: help with android wpa store
Hi ware55.
"what can i do?"
Get the Masterkey of your phone and decrypt it.
Use bash openssl and this (decrypted) key to decrypt your WiFi passwords.
But it isn't an easy way and differs in th... |
|
ZerBea |
hashcat
|
7 |
6,779 |
12-18-2017, 09:02 AM |
|
|
Thread: cap2hccapx - Networks detected: 0
Post: RE: cap2hccapx - Networks detected: 0
@ C-Sky91
Please attach capfile. I would like to take a look inside. |
|
ZerBea |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
7 |
5,286 |
05-02-2019, 05:09 PM |
|
|
Thread: Hashcat not cracking even though dictionary has the password (wifi wpa)
Post: RE: Hashcat not cracking even though dictionary ha...
To find out, what's going on, we also need the cap file (uncleaned). Please compress it with zip and attach it here. |
|
ZerBea |
hashcat
|
7 |
3,666 |
06-22-2019, 03:31 PM |
|
|
Thread: Hashcat not cracking even though dictionary has the password (wifi wpa)
Post: RE: Hashcat not cracking even though dictionary ha...
|
ZerBea |
hashcat
|
7 |
3,666 |
06-23-2019, 10:46 AM |
|
|
Thread: hcxpcaptool does not detect beacon packet
Post: RE: hcxpcaptool does not detect beacon packet
Please post your hashcat command line.
You must use the matching hash mode on hcxpcapngtool and hashcat .
This command lines are valid:
WPA-PBKDF2-PMKID+EAPOL:
$ hcxpcapngtool -o test.22000 *.... |
|
ZerBea |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
7 |
2,671 |
02-18-2020, 01:03 PM |
|
|
Thread: Integer overflow detected in keyspace of mask
Post: RE: Integer overflow detected in keyspace of mask
2501 and 16801 hash modes are designed to verify (pre-)calculated PMKs. Latest hashcat use this modes to detect already recovered passwords, by testing the hash against the PMK (take a look at new has... |
|
ZerBea |
General Talk
|
7 |
6,479 |
04-28-2019, 11:37 AM |