Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
New update https://github.com/ZerBea/hcxtools
added PPP-CHAP Authentication
use wlandump-ng / wlanresponse option lima (-l) to capture IPv4 and IPv6 from WLAN
use wlancap2hcx -n to strip hashes ... |
|
ZerBea |
User Contributions
|
648 |
486,642 |
06-28-2017, 09:42 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
2.
prepare to get passwords for hash-modes 4800 and 5500 and usernames:
$ wlancap2hcx -m hashes4800 -n hashes5500 -u usernames caps/*.*
start reading from caps/brad.eaptest2.cap
5 packets proces... |
|
ZerBea |
User Contributions
|
648 |
486,642 |
07-21-2017, 05:43 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
New update https://github.com/ZerBea/hcxtools
added support for new hashcat hash-mode 2501 = WPA/WPA2 PMK
hcxtools are now able to capture and save possible plainmasterkeys (PMK) from wlantraffic
... |
|
ZerBea |
User Contributions
|
648 |
486,642 |
07-04-2017, 08:24 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
New update https://github.com/ZerBea/hcxtools
added new tool wlancow2hcxpmk
convert cowpatty (pre-computed) hashfiles to hashcat pmklist for hash-mode 2501
Just run wlancow2hcxpmk -i cowhashfile ... |
|
ZerBea |
User Contributions
|
648 |
486,642 |
07-04-2017, 08:15 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
basic tutorial for usie of hash-modes 4800 and 5500 (WPA-ENTERPRISE)
preparation:
We need some example caps. Download
https://www.willhackforsushi.com/code/asleap/2.2/asleap-2.2.tgz
and
https://w... |
|
ZerBea |
User Contributions
|
648 |
486,642 |
07-21-2017, 05:39 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
This feature is allready implemented in wlanhcx2ssid:
$ wlanhcx2ssid -h
usage: wlanhcx2ssid
options:
-i : input hccapx file
-p : change directory for outputfiles
-a ... |
|
ZerBea |
User Contributions
|
648 |
486,642 |
07-06-2017, 08:46 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
New update https://github.com/ZerBea/hcxtools
added new tool wlangenpmk (plainmasterkey generator)
example:
$ wlangenpmk -p mypassword -e mynetwork
essid (networkname): mynetwork
password....... |
|
ZerBea |
User Contributions
|
648 |
486,642 |
07-06-2017, 08:47 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
created a new branch: https://github.com/ZerBea/hcxkeys
added tools wlangenpmk (CPU) and wlangenpmkocl (GPU) to generate rainbowtables of common ESSIDS for use with hash-mode 2501
wlangenpmk 3.6... |
|
ZerBea |
User Contributions
|
648 |
486,642 |
07-16-2017, 03:35 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
I've been asked to write a basic tutorial for wpa/wpa2 on hash-modes 2500, 2501, 12000.
Well, let's start:
1.
Get our example cap from https://wiki.wireshark.org/SampleCaptures
Download wpa-Indu... |
|
ZerBea |
User Contributions
|
648 |
486,642 |
07-17-2017, 01:32 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
6.
let's start to crack it using hash-mode 2500 (the traditional way):
echo "Induction" > wordlist
$ hashcat -m 2500 --potfile-path=hc2500.pot test.hccapx wordlist
hashcat (v3.6.0-207-g1cd0212f) s... |
|
ZerBea |
User Contributions
|
648 |
486,642 |
07-17-2017, 01:32 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
7.
let's start to crack it using hash-mode 2501 (the new and fast way):
generate the plainmasterkey
$ wlangenpmk -e Coherer -p Induction
essid (networkname): Coherer
password...........: Inductio... |
|
ZerBea |
User Contributions
|
648 |
486,642 |
07-17-2017, 01:33 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
8.
let's start to crack it using hash-mode 12000 (the unconventional way):
$ wlanpmk2hcx -e Coherer -p a288fcf0caaacda9a9f58633ff35e8992a01d9c10ba5e02efdf8cb5d730ce7bc
use hashcat hash-mode -m 1200... |
|
ZerBea |
User Contributions
|
648 |
486,642 |
07-17-2017, 01:33 PM |
|
|
Thread: WPA2 crackstation
Post: RE: WPA2 crackstation
I'm running this:
amd ryzen 1700
msi x370 krait
msi gtx 1080 ti aero oc
16 gb g.skill ripjaws v ddr4-3200
Samsung SSD PM961 NVMe 128GB M.2 (arch system)
500 gb samsung evo 850 (data)
bequiet ... |
|
ZerBea |
Hardware
|
6 |
8,586 |
08-01-2017, 01:16 PM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
Short answer to your question:
Yes, it is possible with latest hashcat!
Long statement:
But you don't need that tool!
Using only M1 and M2 is not a new idea.
You can use every combination o... |
|
ZerBea |
hashcat
|
8 |
11,175 |
08-01-2017, 05:09 PM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
And please keep in mind:
hcxtools and hashcat are "area weapons" against wifi!
hashcat (v3.6.0-279-g6946329b) starting...
Session..........: hashcat
Status...........: Running
Hash.Type......... |
|
ZerBea |
hashcat
|
8 |
11,175 |
08-01-2017, 07:11 PM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
Well, answering every probe request, makes it possible that a client will try to connect to us. In that case, we are the access point (ap) which the client expected to see. This is an attempt to get t... |
|
ZerBea |
hashcat
|
8 |
11,175 |
08-01-2017, 11:23 PM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
braxxox Wrote: (08-02-2017, 03:22 AM)
--
The -b option (beaconing on the last 10 probes) will seduce clients which do not send probes, yet, to probe us and then to connect us.
I'm having a bit ... |
|
ZerBea |
hashcat
|
8 |
11,175 |
08-02-2017, 06:54 AM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
ThiagoAlvarenga Wrote: (08-02-2017, 04:48 AM)
--
This is my first post, if I'm posting from the wrong place, to the administrators, move to the correct location and accept my apologies.
My native ... |
|
ZerBea |
hashcat
|
8 |
11,175 |
08-02-2017, 07:10 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Read more about the authentication process and the importance of the message M2 here:
https://hashcat.net/forum/thread-6745-post-36007.html#pid36007 |
|
ZerBea |
User Contributions
|
648 |
486,642 |
08-03-2017, 08:38 AM |
|
|
Thread: Epic cracking!
Post: RE: Epic cracking!
Helped me to get a high hitrate:
https://en.wikipedia.org/wiki/Intelligence_cycle
Cheers |
|
ZerBea |
hashcat
|
17 |
13,870 |
08-04-2017, 08:32 AM |