Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Integer overflow detected in keyspace of mask
Post: RE: Integer overflow detected in keyspace of mask
2501 and 16801 hash modes are designed to verify (pre-)calculated PMKs. Latest hashcat use this modes to detect already recovered passwords, by testing the hash against the PMK (take a look at new has... |
|
ZerBea |
General Talk
|
7 |
6,481 |
04-28-2019, 11:37 AM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
Hi soxrok2212.
Did a quick binwalk, unsquashfs and radare2 on some files and noticed that the values are retrieved from the board:
ls /sys/module/board/parameters/*.*
or by debugsys --info
squas... |
|
ZerBea |
User Contributions
|
182 |
305,378 |
08-24-2018, 01:33 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
...and if you don't have the default ESSID (with the 4 xdigits, required by the WIFI keygen),
$ hcxpsktool --digit10
will calculate the whole key space , based on wpa-sec analyses (known SEEDs):
$ hc... |
|
ZerBea |
User Contributions
|
182 |
305,378 |
05-16-2020, 10:04 AM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
Maybe you're interested in this (not only ATT):
https://boxnet.servehttp.com/cap/pix/DUMP/
BTW:
You can reduce the key space, if you assume "N0" within every serial number:
dddddN0ddddd
That mak... |
|
ZerBea |
User Contributions
|
182 |
305,378 |
05-20-2020, 09:25 AM |
|
|
Thread: Linux + AMD + hashcat
Post: RE: Linux + AMD + hashcat
The enormous misunderstanding of AMD is that they really think LINUX is UBUNTU, or CentOS or RHEL:
The ROCm 2.0.x platform supports the following operating systems:
Ubuntu 16.04.x and 18.04.x (V... |
|
ZerBea |
hashcat
|
3 |
2,984 |
09-05-2019, 04:08 PM |
|
|
Thread: Mode 22000 Bad file descriptor
Post: RE: Mode 22000 Bad file descriptor
Mem5 Wrote: (01-18-2020, 12:51 AM)
--
Using hashcat-5.1.0 beta 1610 :
Code:
--
hashcat.exe -m 22000 hash dic
--
works OK with sample hash WPA*01*9d42bfc4ab79cf3a3a85761efd2a0cf0*e8e61d2bfe07*e2... |
|
ZerBea |
hashcat
|
10 |
3,156 |
01-18-2020, 02:05 PM |
|
|
Thread: Mode 22000 Bad file descriptor
Post: RE: Mode 22000 Bad file descriptor
Thanks. Now, I understand. Please forgive me - I'm old...
16800 can be used for similar hash types from other sources, too - while 22000 not. 22000 is designed for use on WiFi only. |
|
ZerBea |
hashcat
|
10 |
3,156 |
01-19-2020, 05:44 PM |
|
|
Thread: Mode 22000 Bad file descriptor
Post: RE: Mode 22000 Bad file descriptor
We decided not to use ASCII characters, because:
Wireless network stacks must still be prepared to handle arbitrary values in the SSID field!
Using HEX instead of ASCII makes it easier to use com... |
|
ZerBea |
hashcat
|
10 |
3,156 |
01-19-2020, 02:19 PM |
|
|
Thread: Mode 22000 Bad file descriptor
Post: RE: Mode 22000 Bad file descriptor
BTW:
This is a nice feature request on the new hashline:
https://github.com/hashcat/hashcat/issues/2290
I'm playing around with latest commit (Atom added this feature). Now it's easy to correlate h... |
|
ZerBea |
hashcat
|
10 |
3,156 |
01-19-2020, 10:55 PM |
|
|
Thread: need batch stop after pass found hccapx
Post: RE: need batch stop after pass found hccapx
Does it work with the example hash from here if the PSK is in passlist1.txt?
https://hashcat.net/misc/example_hashes/hashcat.hccapx
64 -m 2500 -t 25 --remove -o cracked.txt 1.hccapx pass/passlist1... |
|
ZerBea |
hashcat
|
15 |
3,946 |
01-27-2020, 06:05 PM |
|
|
Thread: need batch stop after pass found hccapx
Post: RE: need batch stop after pass found hccapx
msalman Wrote: (01-28-2020, 03:58 PM)
--
the pass is in my first wordlist
11223344
--
The attached hccapx file is a multi hash file. It contain 15 hashes (6 of them are dupes). If one of them is n... |
|
ZerBea |
hashcat
|
15 |
3,946 |
01-28-2020, 04:44 PM |
|
|
Thread: need batch stop after pass found hccapx
Post: RE: need batch stop after pass found hccapx
hashcat online converter run cap2hccapx from hashcat-utils.
You should know that cap2hccapx will convert more than one hash to the hccapx file. Therefore it takes every good message pair and convert ... |
|
ZerBea |
hashcat
|
15 |
3,946 |
02-01-2020, 09:38 PM |
|
|
Thread: need batch stop after pass found hccapx
Post: RE: need batch stop after pass found hccapx
No, you have to code it by yourself. It is very simple:
https://github.com/ZerBea/hcxtools/issues/121#issuecomment-581013958 |
|
ZerBea |
hashcat
|
15 |
3,946 |
02-04-2020, 04:34 PM |
|
|
Thread: need batch stop after pass found hccapx
Post: RE: need batch stop after pass found hccapx
One last question: Which options have you used to capture the dumpfile?
I noticed that all(!) undirected proberequest frames are not present (filtered out).
This frames may contain information abo... |
|
ZerBea |
hashcat
|
15 |
3,946 |
02-06-2020, 11:52 AM |
|
|
Thread: Need help on converting to hccap or run newer Hashcat
Post: RE: Need help on converting to hccap or run newer ...
https://github.com/aircrack-ng/aircrack-ng/issues/1993
https://github.com/aircrack-ng/aircrack-ng/issues/2067
If you attach the cap file here (zip compressed), we can take a look inside.
and/or... |
|
ZerBea |
hashcat
|
3 |
1,392 |
08-27-2019, 12:28 PM |
|
|
Thread: Need help with hashcat
Post: RE: Need help with hashcat
Download latest CUDA (10.2) from here:
https://developer.nvidia.com/cuda-downloads
or use Arch Linux:
$ uname -r
5.5.2-arch1-1
$ pacman -Q | grep nvidia
nvidia 440.59-3
nvidia-settings 440.... |
|
ZerBea |
hashcat
|
2 |
1,053 |
02-06-2020, 11:11 AM |
|
|
Thread: need help with hcx dumptool what am i doing wrong
Post: RE: need help with hcx dumptool what am i doing wr...
In your case:
[16:26:17 - 001] 009fa9073914 -> 5c93a20b3897 [FOUND AUTHORIZED HANDSHAKE, EAPOL TIMEOUT 2516]
[16:40:15 - 001] 009fa9073914 -> ccfb65942f7e [FOUND AUTHORIZED HANDSHAKE, EAPOL TIMEOUT ... |
|
ZerBea |
hashcat
|
2 |
2,293 |
11-06-2018, 10:36 AM |
|
|
Thread: need help with hcx dumptool what am i doing wrong
Post: RE: need help with hcx dumptool what am i doing wr...
Added new filter mode 3 (filter receiving branch) to hcxdumptool.
--filterlist= : mac filter list
format: 112233445566 + comment
... |
|
ZerBea |
hashcat
|
2 |
2,293 |
11-07-2018, 12:18 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA using PMKID
Thanks for reporting this issue. I fixed it with the last commit.
We tried to use filterlist entries on the first outgoing broadcast packet. Since there are no incomming packets at this moment, we ru... |
|
ZerBea |
User Contributions
|
187 |
1,293,321 |
08-05-2018, 10:53 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Latest link is expired, so I can't download the file.
hcxdumptool attack and dump modes depend on filter list and filter mode option. Running without this options, hcxdumptool will attack all and cap... |
|
ZerBea |
User Contributions
|
187 |
1,293,321 |
11-17-2018, 09:44 AM |