Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
All characters lower 0x20 and greater than 0x7e are converted to $HEX[xxxxxxx].
There is no plan to support other charactersets, because hashcat is able to handle the output from hcxtools. |
|
ZerBea |
User Contributions
|
648 |
487,306 |
08-12-2018, 01:50 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
New chipset reported to work with hcxdumptool:
Bus 001 Device 002: ID 148f:2573 Ralink Technology, Corp. RT2501/RT2573 Wireless Adapter |
|
ZerBea |
User Contributions
|
648 |
487,306 |
08-12-2018, 01:51 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Well, it doesn't make sense to attack dynamically derived PMKs, but it's really funny.
I did a small update on hcxtools.
Download example cap from here:
https://wiki.wireshark.org/SampleCaptures... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-13-2018, 11:25 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
I got many issue reports on git regarding K*A*L*I.
For all K*A*L*I users, which are not penetration testers, please read this nice post here (remove the "*" inside the link):
https://unix.stackexch... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-14-2018, 08:32 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Hi Kangaroot.
You're running an old version. Latest commit is v 4.2.1:
https://github.com/ZerBea/hcxdumptool/commit/95ef2951c5da7eec9d5469d43fc0851522a2d9d0
several bugfixes and new/changed options |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-14-2018, 11:02 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi recombinant.
Does stanev's wpa-sec site support the PMKID derived from the recent PMKID attack, or is it only going to show networks that have the handshake captured?
-> wpa-sec is working on ... |
|
ZerBea |
User Contributions
|
648 |
487,306 |
08-14-2018, 11:45 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi SIMBA_1983.
My question is: if the crack speed is the same for both 2500 and 16800 modes then hashcat does the same mathematical calculations for both formats, right?
-> 16800 is a little bit fa... |
|
ZerBea |
User Contributions
|
648 |
487,306 |
08-15-2018, 08:46 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Well, rolling release principle.... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-15-2018, 10:33 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi recombinant
are you accepting pull requests?
-> yes, but under the restrictions of README.md:
- Multiple stand-alone binaries - designed to run on Arch Linux.
- All of these utils are desig... |
|
ZerBea |
User Contributions
|
648 |
487,306 |
08-15-2018, 10:35 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
How did you learn so much about wireless authentication and the associated attacks?
-> 35 years cryptanalysis and traffic analysis. |
|
ZerBea |
User Contributions
|
648 |
487,306 |
08-15-2018, 12:52 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
This bug was fixed last week! Do you use the latest commit? |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-15-2018, 07:57 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Hi Kangaroot.
Forgot to answer to this:
Although, --enable-status now accepts only one of four options, not all of them as it used to.
-> No, now we use a bitmask.
- you can run --enable-status=1 ... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-15-2018, 08:00 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Well, it is a new attack vector and a nice playground.
Take a look at the statistics of a typical hcxdumptool pcapng file. I got this one from a tester:
summary:
file name....................:... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-16-2018, 10:05 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
That are some good news.
Well, UBUNTU is recommended by hashcat team and is an easy to use distribution. I share that opinion. Designed for complete novices, UBUNTU teaches a beginner everything he n... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-16-2018, 02:19 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi chribonn.
Pull request to support Android came from here:
https://github.com/JuniorJPDJ
and should be answered by JuniorJPDJ. |
|
ZerBea |
User Contributions
|
648 |
487,306 |
08-16-2018, 02:34 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
...many ways lead to Rome.
You can split your hccapx file with split (a single record is 393 bytes) and use cut to merge them.
https://stackoverflow.com/questions/2016894/how-to-split-a-large-text-f... |
|
ZerBea |
User Contributions
|
648 |
487,306 |
08-16-2018, 05:48 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
That's interesting:
You received 4 PMKIDs for a single network (I assume that it isn't an ENTERPRISE network). So there must be 4 clients.
How is the commandline for hcxdumptool?
A hashfile shoul... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-17-2018, 03:40 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Running hcxdumptool on Android isn't trivial and rooting the device and/or using a custom ROM (for example LINEAGE) isn't enough.
Read more here:
https://github.com/seemoo-lab/nexmon |
|
ZerBea |
User Contributions
|
648 |
487,306 |
08-17-2018, 10:14 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
hcxdumptool is able to run different attack vectors. And the client-less (PMKID) attack vector is only one of them:
ap-less:
Only one packet (M2) from a client required. You do not need to hunt fo... |
|
ZerBea |
User Contributions
|
187 |
1,293,331 |
08-17-2018, 10:51 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
small update hcxpcaptool:
detect NETWORK EAP authentication system and Wilibox specific authentication fields:
$ hcxpcaptool -V test.pcapng
start reading from test.pcapng
Summary: �... |
|
ZerBea |
User Contributions
|
648 |
487,306 |
08-17-2018, 03:46 PM |