Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
I changed naming from AP-LESS to ROGUE ATTACK, because the attack vector isn't AP-LESS or CLIENT-LESS. Instead hcxdumptool will act as a "ROGUE" ACCESS POINT for a CLIENT and as a ROGUE CLIENT for an ... |
|
ZerBea |
User Contributions
|
648 |
487,246 |
05-12-2020, 04:56 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
We have an initial start value for MAC_AP and MAC_STA:
Code:
--
$ sudo hcxdumptool -i wlp39s0f3u3u1u2
initialization...
start capturing (stop with ctrl+c)
NMEA 0183 SENTENCE........: N/A
INTERFACE... |
|
ZerBea |
User Contributions
|
648 |
487,246 |
05-13-2020, 08:42 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
No, because we have to stay much longer on the channel do do this.
Besides:
AUTHENTICATION REQUEST, AUTHENTICATION RESPONSE,
ASSOCIATION REQUEST, ASSOCIATIONREPONSE
(each of them followed by an AC... |
|
ZerBea |
User Contributions
|
648 |
487,246 |
05-14-2020, 08:15 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Very well observed.
We don't want to flood the terminal with duplicated messages. So every combination AP - ESSID is only displayed once on first occurrence. Some CLIENTs randomize their MACs - that... |
|
ZerBea |
User Contributions
|
648 |
487,246 |
05-19-2020, 07:54 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
The whole filter stuff was refactored:
Now we have filtermode (0, 1, 2) in combination with filterlist_ap (ACCESS POINTs) and filterlist_client (CLIENTs).
That is much faster than filtering ACCESS P... |
|
ZerBea |
User Contributions
|
648 |
487,246 |
05-23-2020, 01:59 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
hcxdumptool try to attack the ACCESS POINT (AP) by transmitting several requests and capture the whole traffic. That depend on the options, you selected.
If the AP respond to the requests, we retriev... |
|
ZerBea |
User Contributions
|
648 |
487,246 |
06-24-2020, 12:37 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
That depend on the wireless driver (must support full monitor mode, full packet injection and ioctl() system calls).
At last the Atheros driver (ath9k) was completely broken:
https://bugzilla.kernel... |
|
ZerBea |
User Contributions
|
648 |
487,246 |
07-23-2020, 08:18 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Here you will get some good additional information:
https://www.siliceo.es/en/classification-of-the-best-chip-wifi-powerful-for-adapters-usb-features-and-compatibilities/
https://www.siliceo.es/en/t... |
|
ZerBea |
User Contributions
|
648 |
487,246 |
07-29-2020, 08:40 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Nice to hear that.
Unfortunately driver was broken on other kernel versions for a few months:
https://bugzilla.kernel.org/show_bug.cgi?id=208579
https://bugzilla.kernel.org/show_bug.cgi?id=208577
... |
|
ZerBea |
User Contributions
|
648 |
487,246 |
09-15-2020, 10:02 PM |
|
|
Thread: help with android wpa store
Post: RE: help with android wpa store
Hi ware55.
use hashcat hashmode -m 12000
and read basic information (how-to) here:
https://hashcat.net/forum/thread-6661-post-35846.html#pid35846
In case of an ANDROID hotspot default password... |
|
ZerBea |
hashcat
|
7 |
6,783 |
12-17-2017, 11:28 AM |
|
|
Thread: help with android wpa store
Post: RE: help with android wpa store
Thanks for the additional informations. Now I understand what you mean.
Well, I assume
- you use a SAMSUNG ANDROID device (?)
- you have secure storage activated (?)
- your device is rooted (?)
... |
|
ZerBea |
hashcat
|
7 |
6,783 |
12-17-2017, 05:15 PM |
|
|
Thread: help with android wpa store
Post: RE: help with android wpa store
Hi ware55.
"what can i do?"
Get the Masterkey of your phone and decrypt it.
Use bash openssl and this (decrypted) key to decrypt your WiFi passwords.
But it isn't an easy way and differs in th... |
|
ZerBea |
hashcat
|
7 |
6,783 |
12-18-2017, 09:02 AM |
|
|
Thread: help with android wpa store
Post: RE: help with android wpa store
Hi ware55.
As this depends on your cell phone and your Android Version, it's a question to ask in this forum:
https://forum.xda-developers.com |
|
ZerBea |
hashcat
|
7 |
6,783 |
12-20-2017, 06:26 PM |
|
|
Thread: Help with hashcat infrastructure
Post: RE: Help with hashcat infrastructure
Try this one:
https://github.com/RealEnder/dwpa |
|
ZerBea |
hashcat
|
2 |
779 |
04-07-2020, 08:50 AM |
|
|
Thread: How can i get hash from a cap file?
Post: RE: How can i get hash from a cap file?
1)
depending on your hashcat version and hash mode it is either a PMKID or a MIC or a MD5_64 (ancient versions of hashcat).
The posted line is not the raw hash. Instead it is the result of hashcat.
... |
|
ZerBea |
hashcat
|
1 |
873 |
03-23-2020, 07:14 PM |
|
|
Thread: How to encrypt password with wpa2?
Post: RE: How to encrypt password with wpa2?
Take a look at hcxtools and hcxkeys. The suite contains various converters (except converters which are able to flood online hashcrackers with fake hashes). If you would like to learn how it (PBKDF2) ... |
|
ZerBea |
hashcat
|
9 |
3,128 |
08-15-2019, 10:30 AM |
|
|
Thread: How to view SSID of cracked PMKID (16800) PCAP?
Post: RE: How to view SSID of cracked PMKID (16800) PCAP...
Are you running an older version of hashcat?
$ hashcat -V
v5.1.0-1569-g74c1bf81+
potfile: PMK * ESSID : PSK
Code:
--
5b13d4babb3714ccc62c9f71864bc984efd6a55f237c7a87fc2151e1ca658a9d*ed4871624... |
|
ZerBea |
hashcat
|
6 |
2,256 |
01-12-2020, 12:07 PM |
|
|
Thread: How to view SSID of cracked PMKID (16800) PCAP?
Post: RE: How to view SSID of cracked PMKID (16800) PCAP...
And some of this characters will destroy your terminal. This is especially the case if escape sequences are in use! So it is definitely a good idea to hexify them
Examples:
https://wpa-sec.stanev.... |
|
ZerBea |
hashcat
|
6 |
2,256 |
04-01-2020, 03:38 PM |
|
|
Thread: i cant convert a WPA / WPA2 pcap
Post: RE: i cant convert a WPA / WPA2 pcap
and if you really need to clean up your cap file: tshark is your friend
for output format pcap (cap2hccapx understand this):
tshark -r raw.cap -R "(wlan.fc.type_subtype == 0x00 || wlan.fc.type_sub... |
|
ZerBea |
General Talk
|
3 |
2,373 |
01-20-2019, 09:09 PM |
|
|
Thread: Indirect signs of PSK being changed
Post: RE: Indirect signs of PSK being changed
If the old PSK is known, hcxdumptool --weakcandidate will do that. No alert == PSK changed.
If the old PSK is known, you can use hcxpcapngtool --all option to identify PSK changes.
If ESSID and PSK ... |
|
ZerBea |
General Talk
|
2 |
809 |
04-04-2020, 08:18 AM |