Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views [desc] Posted
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Hi Kangaroot. You're running an old version. Latest commit is v 4.2.1: https://github.com/ZerBea/hcxdumptool/commit/95ef2951c5da7eec9d5469d43fc0851522a2d9d0 several bugfixes and new/changed options
ZerBea User Contributions 187 1,293,321 08-14-2018, 11:02 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Well, rolling release principle....
ZerBea User Contributions 187 1,293,321 08-15-2018, 10:33 AM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

This bug was fixed last week! Do you use the latest commit?
ZerBea User Contributions 187 1,293,321 08-15-2018, 07:57 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Hi Kangaroot. Forgot to answer to this: Although, --enable-status now accepts only one of four options, not all of them as it used to. -> No, now we use a bitmask. - you can run --enable-status=1 ...
ZerBea User Contributions 187 1,293,321 08-15-2018, 08:00 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

That's interesting: You received 4 PMKIDs for a single network (I assume that it isn't an ENTERPRISE network). So there must be 4 clients. How is the commandline for hcxdumptool? A hashfile shoul...
ZerBea User Contributions 187 1,293,321 08-17-2018, 03:40 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Correct. Running hcxdumptool without disable arguments and/or setting a filterlist is the most aggressive mode. hcxdumptool will run deauthentications against established connections and disassociati...
ZerBea User Contributions 187 1,293,321 08-17-2018, 05:46 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

added rcascan (radio assignement scan): $ hcxdumptool -h --do_rcascan: show radio channel assignment (scan for target access points) xxxxxxxxxxxx [CHANNEL 1] xxxxxxxxxxxx [CHANNEL 7] xxxxxxxx...
ZerBea User Contributions 187 1,293,321 08-19-2018, 01:14 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Hi stinky. No, that is business as usual: WPA-EAPOL-PBKDF2. If we got only M4 of the handshake, we simply ask for the other key messages to retrieve an authorized handshake. That's all - just another...
ZerBea User Contributions 187 1,293,321 08-19-2018, 03:58 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Usually we use panel antennas like this ones: https://www.logilink.com/Products_LogiLink/Active_Network_Components/Wireless_LAN_Antennas/Wireless_LAN_Antenna_Yagi-directional_14_dBi-Outdoor.htm https...
ZerBea User Contributions 187 1,293,321 08-19-2018, 06:21 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Another driver, tested with hcxdumptool (again Realtek): https://github.com/kimocoder/rtl8812au/ [35053.423872] usb 5-4.5: Product: Edimax AC600 USB [35053.423874] usb 5-4.5: Manufacturer: Realte...
ZerBea User Contributions 187 1,293,321 08-20-2018, 06:54 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Hi dizcza. Yes, there is a way. From the README.md: Notice Most output files will be appended to existing files (with the exception of .cap files). You can/should cat all outputs from hcxpcaptool ...
ZerBea User Contributions 187 1,293,321 08-26-2018, 03:30 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Hi diegodieguex. Nice improvement. Now we can retrieve the ESSID (in ASCII) and the VENDOR information from the hashline.
ZerBea User Contributions 187 1,293,321 08-26-2018, 05:24 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Hi sao. The answer of your question is here: https://hashcat.net/forum/thread-7717-post-41675.html#pid41675
ZerBea User Contributions 187 1,293,321 08-27-2018, 02:24 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Now, wpa-sec running full PMKID support. ‎The success rate is very good: https://wpa-sec.stanev.org/?stats
ZerBea User Contributions 187 1,293,321 08-27-2018, 06:32 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

To answer the question we need more informations: Which tools do you use for capturing, conversation and cracking? How is the commandline of the tools? Which result do yo expect (exactly)? Which r...
ZerBea User Contributions 187 1,293,321 08-31-2018, 09:59 AM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

$ hcxpcaptool -z hash.16800 -E wordlist -I identitylist -U usernamelist *.pcap Works on all pcaps, but do not expect good results if - the pcaps are cleaned - the pcap are merged and contains ESS...
ZerBea User Contributions 187 1,293,321 09-01-2018, 03:31 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

As diegodieguex noticed, that function is allready in hcxtools (whoismac) implemented. hcxpcaptool is a conversion tool, only. It will show basic informations about the capture file. But I think about...
ZerBea User Contributions 187 1,293,321 09-03-2018, 06:19 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

Hi marcou3000. Mem5 gave you a good advice and I recommend to follow his advice! hashcat -m 16800 -w 3 82445.16800 -a 3 ?l?l?l?l?l?lt! should do the job It's also important to check your atta...
ZerBea User Contributions 187 1,293,321 09-21-2018, 11:29 AM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

From the WikiDevi: Supported modes: STA (Station) mode: supported IBSS (Ad-Hoc) mode: supported AP (Master) mode: supported Mesh (802.11s) mode: supported P2P mode: supported Monitor mode: su...
ZerBea User Contributions 187 1,293,321 09-22-2018, 06:31 PM
    Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID

"file or directory not found" means that there is no file test.pcapng in that directory. Just do a $ ls to see what files are present.
ZerBea User Contributions 187 1,293,321 09-27-2018, 05:52 PM