Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: [ask] cap to hccapx
Post: RE: [ask] cap to hccapx

Hi ghsi10. Nice idea (a python/java port). But if you do that, please do not write this message_pairs into your converted hccapx: MESSAGE_PAIR_M32E3 (3) MESSAGE_PAIR_M32E3 (131) MESSAGE_PAIR_M34E...
ZerBea User Contributions 6 6,453 12-07-2017, 10:26 AM
    Thread: WPA3 Dragonblood Vulnerabilities Disclosure
Post: RE: WPA3 Dragonblood Vulnerabilities Disclosure

Yes, very good and interesting analysis of some WPA3 flaws. Unfortunately the side channel attack requires at least unprivileged access to the victim (dragonblood.pdf: 7.2 Attack Scenario). In other w...
ZerBea General Talk 5 3,493 04-17-2019, 08:53 PM
    Thread: WPA3 Dragonblood Vulnerabilities Disclosure
Post: RE: WPA3 Dragonblood Vulnerabilities Disclosure

Yes, wpa_supplicant and hostapd are amazing open source tools. I really love them both and they are an integral part of my test environment to improve hcxdumptool.
ZerBea General Talk 5 3,493 04-20-2019, 10:11 AM
    Thread: WPA3 Dragonblood Vulnerabilities Disclosure
Post: RE: WPA3 Dragonblood Vulnerabilities Disclosure

How does hcxdumptool work with WPA3? It only detect the AUTHENTICATION. Do you reuse tools from Dragloblood? No, this tools are useless, because they require at least unprivileged access to the v...
ZerBea General Talk 5 3,493 05-15-2020, 10:34 PM
    Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake

Short answer to your question: Yes, it is possible with latest hashcat! Long statement: But you don't need that tool! Using only M1 and M2 is not a new idea. You can use every combination o...
ZerBea hashcat 8 11,186 08-01-2017, 05:09 PM
    Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake

And please keep in mind: hcxtools and hashcat are "area weapons" against wifi! hashcat (v3.6.0-279-g6946329b) starting... Session..........: hashcat Status...........: Running Hash.Type.........
ZerBea hashcat 8 11,186 08-01-2017, 07:11 PM
    Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake

Well, answering every probe request, makes it possible that a client will try to connect to us. In that case, we are the access point (ap) which the client expected to see. This is an attempt to get t...
ZerBea hashcat 8 11,186 08-01-2017, 11:23 PM
    Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake

braxxox Wrote: (08-02-2017, 03:22 AM) -- The -b option (beaconing on the last 10 probes) will seduce clients which do not send probes, yet, to probe us and then to connect us. I'm having a bit ...
ZerBea hashcat 8 11,186 08-02-2017, 06:54 AM
    Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake

ThiagoAlvarenga Wrote: (08-02-2017, 04:48 AM) -- This is my first post, if I'm posting from the wrong place, to the administrators, move to the correct location and accept my apologies. My native ...
ZerBea hashcat 8 11,186 08-02-2017, 07:10 AM
    Thread: WPA2 crackstation
Post: RE: WPA2 crackstation

I'm running this: amd ryzen 1700 msi x370 krait msi gtx 1080 ti aero oc 16 gb g.skill ripjaws v ddr4-3200 Samsung SSD PM961 NVMe 128GB M.2 (arch system) 500 gb samsung evo 850 (data) bequiet ...
ZerBea Hardware 6 8,594 08-01-2017, 01:16 PM
    Thread: WPA2 crackstation
Post: RE: WPA2 crackstation

$ hashcat -m 2500 --benchmark hashcat (v3.6.0-305-g1b835c8f) starting in benchmark mode... OpenCL Platform #1: NVIDIA Corporation ====================================== * Device #1: GeForce GTX 10...
ZerBea Hardware 6 8,594 08-04-2017, 08:37 AM
    Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)

here: https://github.com/ZerBea/hcxkeys
ZerBea General Talk 20 19,682 03-02-2018, 06:33 PM
    Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)

wlangenpmkocl is the choice to precalculate PMKs for hashcat: $ wlangenpmkocl -h wlangenpmkocl 4.0.1 (C) 2018 ZeroBeat usage: wlangenpmkocl options: -e : input single essid (networkname:...
ZerBea General Talk 20 19,682 03-02-2018, 02:23 PM
    Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)

Maybe you're doing something wrong: $ time wlangenpmkocl -e networkname -i rockyou -A pmklist using: GeForce GTX 1080 Ti 9612471 plainmasterkeys generated, 4734589 password(s) skipped real 0m4...
ZerBea General Talk 20 19,682 03-03-2018, 07:07 PM
    Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)

wlangenpmkocl use only one GPU each task. If you have 2 GPUs, you can calculate 2 different(!) PMK lists at the same time (or two parts of the same list - you need to split your word list into 2 parts...
ZerBea General Talk 20 19,682 03-04-2018, 07:30 PM
    Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)

Well, that's easy to explain: Both modes 2501 and 12000 designed are for analysts who work on large hashfiles. ‎ You captured a network with the same ESSID. Time for calculation of the PMK list ...
ZerBea General Talk 20 19,682 03-05-2018, 10:46 AM
    Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)

And Again: If you think, 2501 is slow, you're doing something really, really wrong: Session..........: hashcat Status...........: Running Hash.Type........: WPA/WPA2 PMK Hash.Target......: archi...
ZerBea General Talk 20 19,682 03-05-2018, 11:02 AM
    Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)

No problem, you're welcome. If you are an analyst (coding-, crypto-, weak point analysis), or a penetration tester, or if you use a huge database (wpa-sec) 2501 /12000 is your mode. If not, there is...
ZerBea General Talk 20 19,682 03-05-2018, 11:26 AM
    Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)

The simplest way: hashcat -m 2501 test.hccapx pmklist But it doesn't make sense for you, if you are not an analyst!
ZerBea General Talk 20 19,682 03-17-2018, 04:00 PM
    Thread: WPA/WPA2 batch processing
Post: RE: WPA/WPA2 batch processing

Working on hashfile.16800 is easy to handle (much easier than working on hccapx files), as it is a txt file. That means, every bash command is working on that file. For example: get all ESSIDs with ...
ZerBea hashcat 8 5,355 09-27-2018, 10:58 AM