Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: [ask] cap to hccapx
Post: RE: [ask] cap to hccapx
Hi ghsi10.
Nice idea (a python/java port).
But if you do that, please do not write this message_pairs into your converted hccapx:
MESSAGE_PAIR_M32E3 (3)
MESSAGE_PAIR_M32E3 (131)
MESSAGE_PAIR_M34E... |
|
ZerBea |
User Contributions
|
6 |
6,453 |
12-07-2017, 10:26 AM |
|
|
Thread: WPA3 Dragonblood Vulnerabilities Disclosure
Post: RE: WPA3 Dragonblood Vulnerabilities Disclosure
Yes, very good and interesting analysis of some WPA3 flaws. Unfortunately the side channel attack requires at least unprivileged access to the victim (dragonblood.pdf: 7.2 Attack Scenario). In other w... |
|
ZerBea |
General Talk
|
5 |
3,493 |
04-17-2019, 08:53 PM |
|
|
Thread: WPA3 Dragonblood Vulnerabilities Disclosure
Post: RE: WPA3 Dragonblood Vulnerabilities Disclosure
Yes, wpa_supplicant and hostapd are amazing open source tools. I really love them both and they are an integral part of my test environment to improve hcxdumptool. |
|
ZerBea |
General Talk
|
5 |
3,493 |
04-20-2019, 10:11 AM |
|
|
Thread: WPA3 Dragonblood Vulnerabilities Disclosure
Post: RE: WPA3 Dragonblood Vulnerabilities Disclosure
How does hcxdumptool work with WPA3?
It only detect the AUTHENTICATION.
Do you reuse tools from Dragloblood?
No, this tools are useless, because they require at least unprivileged access to the v... |
|
ZerBea |
General Talk
|
5 |
3,493 |
05-15-2020, 10:34 PM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
Short answer to your question:
Yes, it is possible with latest hashcat!
Long statement:
But you don't need that tool!
Using only M1 and M2 is not a new idea.
You can use every combination o... |
|
ZerBea |
hashcat
|
8 |
11,186 |
08-01-2017, 05:09 PM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
And please keep in mind:
hcxtools and hashcat are "area weapons" against wifi!
hashcat (v3.6.0-279-g6946329b) starting...
Session..........: hashcat
Status...........: Running
Hash.Type......... |
|
ZerBea |
hashcat
|
8 |
11,186 |
08-01-2017, 07:11 PM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
Well, answering every probe request, makes it possible that a client will try to connect to us. In that case, we are the access point (ap) which the client expected to see. This is an attempt to get t... |
|
ZerBea |
hashcat
|
8 |
11,186 |
08-01-2017, 11:23 PM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
braxxox Wrote: (08-02-2017, 03:22 AM)
--
The -b option (beaconing on the last 10 probes) will seduce clients which do not send probes, yet, to probe us and then to connect us.
I'm having a bit ... |
|
ZerBea |
hashcat
|
8 |
11,186 |
08-02-2017, 06:54 AM |
|
|
Thread: WPA2 Half-Handshake
Post: RE: WPA2 Half-Handshake
ThiagoAlvarenga Wrote: (08-02-2017, 04:48 AM)
--
This is my first post, if I'm posting from the wrong place, to the administrators, move to the correct location and accept my apologies.
My native ... |
|
ZerBea |
hashcat
|
8 |
11,186 |
08-02-2017, 07:10 AM |
|
|
Thread: WPA2 crackstation
Post: RE: WPA2 crackstation
I'm running this:
amd ryzen 1700
msi x370 krait
msi gtx 1080 ti aero oc
16 gb g.skill ripjaws v ddr4-3200
Samsung SSD PM961 NVMe 128GB M.2 (arch system)
500 gb samsung evo 850 (data)
bequiet ... |
|
ZerBea |
Hardware
|
6 |
8,594 |
08-01-2017, 01:16 PM |
|
|
Thread: WPA2 crackstation
Post: RE: WPA2 crackstation
$ hashcat -m 2500 --benchmark
hashcat (v3.6.0-305-g1b835c8f) starting in benchmark mode...
OpenCL Platform #1: NVIDIA Corporation
======================================
* Device #1: GeForce GTX 10... |
|
ZerBea |
Hardware
|
6 |
8,594 |
08-04-2017, 08:37 AM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
here:
https://github.com/ZerBea/hcxkeys |
|
ZerBea |
General Talk
|
20 |
19,682 |
03-02-2018, 06:33 PM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
wlangenpmkocl is the choice to precalculate PMKs for hashcat:
$ wlangenpmkocl -h
wlangenpmkocl 4.0.1 (C) 2018 ZeroBeat
usage: wlangenpmkocl
options:
-e : input single essid (networkname:... |
|
ZerBea |
General Talk
|
20 |
19,682 |
03-02-2018, 02:23 PM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
Maybe you're doing something wrong:
$ time wlangenpmkocl -e networkname -i rockyou -A pmklist
using: GeForce GTX 1080 Ti
9612471 plainmasterkeys generated, 4734589 password(s) skipped
real 0m4... |
|
ZerBea |
General Talk
|
20 |
19,682 |
03-03-2018, 07:07 PM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
wlangenpmkocl use only one GPU each task. If you have 2 GPUs, you can calculate 2 different(!) PMK lists at the same time (or two parts of the same list - you need to split your word list into 2 parts... |
|
ZerBea |
General Talk
|
20 |
19,682 |
03-04-2018, 07:30 PM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
Well, that's easy to explain:
Both modes 2501 and 12000 designed are for analysts who work on large hashfiles.
You captured a network with the same ESSID.
Time for calculation of the PMK list ... |
|
ZerBea |
General Talk
|
20 |
19,682 |
03-05-2018, 10:46 AM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
And Again: If you think, 2501 is slow, you're doing something really, really wrong:
Session..........: hashcat
Status...........: Running
Hash.Type........: WPA/WPA2 PMK
Hash.Target......: archi... |
|
ZerBea |
General Talk
|
20 |
19,682 |
03-05-2018, 11:02 AM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
No problem, you're welcome.
If you are an analyst (coding-, crypto-, weak point analysis), or a penetration tester, or if you use a huge database (wpa-sec) 2501 /12000 is your mode.
If not, there is... |
|
ZerBea |
General Talk
|
20 |
19,682 |
03-05-2018, 11:26 AM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
The simplest way:
hashcat -m 2501 test.hccapx pmklist
But it doesn't make sense for you, if you are not an analyst! |
|
ZerBea |
General Talk
|
20 |
19,682 |
03-17-2018, 04:00 PM |
|
|
Thread: WPA/WPA2 batch processing
Post: RE: WPA/WPA2 batch processing
Working on hashfile.16800 is easy to handle (much easier than working on hccapx files), as it is a txt file.
That means, every bash command is working on that file.
For example: get all ESSIDs with ... |
|
ZerBea |
hashcat
|
8 |
5,355 |
09-27-2018, 10:58 AM |