Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: hashcat v4.1.0
Post: RE: hashcat v4.1.0
Awesome. Great job. Thanks for your big efforts.
Now let us look optimistically into the future: FreeRADIUS, VPN and TLS (and some EAP variants) are on top of the list.
Cheers |
|
ZerBea |
hashcat
|
13 |
32,462 |
02-22-2018, 10:11 AM |
|
|
Thread: hashcat 6.0.0
Post: RE: hashcat 6.0.0
Amazing improvements, especially the new WPA fetures. Thanks for coding this great tool.
Cheers
Mike |
|
ZerBea |
hashcat
|
21 |
87,684 |
06-16-2020, 06:03 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
Hi soxrok2212.
Did a quick binwalk, unsquashfs and radare2 on some files and noticed that the values are retrieved from the board:
ls /sys/module/board/parameters/*.*
or by debugsys --info
squas... |
|
ZerBea |
User Contributions
|
182 |
305,383 |
08-24-2018, 01:33 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
...and if you don't have the default ESSID (with the 4 xdigits, required by the WIFI keygen),
$ hcxpsktool --digit10
will calculate the whole key space , based on wpa-sec analyses (known SEEDs):
$ hc... |
|
ZerBea |
User Contributions
|
182 |
305,383 |
05-16-2020, 10:04 AM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
Maybe you're interested in this (not only ATT):
https://boxnet.servehttp.com/cap/pix/DUMP/
BTW:
You can reduce the key space, if you assume "N0" within every serial number:
dddddN0ddddd
That mak... |
|
ZerBea |
User Contributions
|
182 |
305,383 |
05-20-2020, 09:25 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: hcxtools - solution for capturing wlan traffic and...
Small set of tools to capture and convert packets from wlan devices designed for the use with latest hashcat:
wlandump-ng (Small, fast and powerfull deauthentication/authentication/response tool)
... |
|
ZerBea |
User Contributions
|
648 |
487,268 |
06-23-2017, 04:24 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Well, that's allready implemented in wlandump-ng
wlandump-ng -i -o test.cap -c 1 -t 60 -d 100 -D 10 -m 512 -b -r -s 20
and wlanresponse
wlanresponse -i -o test.cap -b -t 3
and much more... |
|
ZerBea |
User Contributions
|
648 |
487,268 |
06-23-2017, 11:15 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
added iSCSI CHAP authentication, MD5(CHAP)
and option to save usernames/identities to a file |
|
ZerBea |
User Contributions
|
648 |
487,268 |
06-24-2017, 09:58 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
refactored scan engine
now full 5GHz support
for fixed channel operation use high value (-t 86400 for a day)
see wlandump-ng -h
device must support this! |
|
ZerBea |
User Contributions
|
648 |
487,268 |
06-24-2017, 08:47 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
example of a typical output: wlancap2hcx *.cap
start reading from example.cap
27278 packets processed (27278 wlan, 0 lan, 0 loopback)
found 24 usefull wpa handshakes
hashcat --nonce-error-correcti... |
|
ZerBea |
User Contributions
|
648 |
487,268 |
06-25-2017, 03:32 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Did an update on hcxtools:
added detection of PPP CHAP Authentication in IPv4 packets (high experimental !)
to implement this function also on IPv6 packets - I need some of this caps (ethernet or wl... |
|
ZerBea |
User Contributions
|
648 |
487,268 |
06-26-2017, 09:43 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
To test if your captured networks are vulnerable using common wordlists, upload your caps to https://wpa-sec.stanev.org/?nets
step 1:
wlancap2wpasec *.cap (internet connection required)
step 2:
... |
|
ZerBea |
User Contributions
|
648 |
487,268 |
06-28-2017, 05:28 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
New update https://github.com/ZerBea/hcxtools
added PPP-CHAP Authentication
use wlandump-ng / wlanresponse option lima (-l) to capture IPv4 and IPv6 from WLAN
use wlancap2hcx -n to strip hashes ... |
|
ZerBea |
User Contributions
|
648 |
487,268 |
06-28-2017, 09:42 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
New update https://github.com/ZerBea/hcxtools
added new tool wlancow2hcxpmk
convert cowpatty (pre-computed) hashfiles to hashcat pmklist for hash-mode 2501
Just run wlancow2hcxpmk -i cowhashfile ... |
|
ZerBea |
User Contributions
|
648 |
487,268 |
07-04-2017, 08:15 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
example of a typical status: sudo wlandump-ng -i wlp0s26u1u2 -o test.cap -c 1 -t 3 -d 100 -D 10 -m 512 -b -r -s 20
interface.....................................................: wlp0s26u1u2
interna... |
|
ZerBea |
User Contributions
|
648 |
487,268 |
06-25-2017, 04:29 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
capture:
sudo wlandump-ng -i wlp0s26u1u2 -o test.cap -c 1 -t 3 -d 100 -D 10 -m 512 -b -r -s 20
Options:
-i -> is the name of your wlan device - do not use virtual devices like mon0, mon1, monx
-o ... |
|
ZerBea |
User Contributions
|
648 |
487,268 |
06-26-2017, 09:40 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
New update https://github.com/ZerBea/hcxtools
added support for new hashcat hash-mode 2501 = WPA/WPA2 PMK
hcxtools are now able to capture and save possible plainmasterkeys (PMK) from wlantraffic
... |
|
ZerBea |
User Contributions
|
648 |
487,268 |
07-04-2017, 08:24 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
New update https://github.com/ZerBea/hcxtools
added new tool wlangenpmk (plainmasterkey generator)
example:
$ wlangenpmk -p mypassword -e mynetwork
essid (networkname): mynetwork
password....... |
|
ZerBea |
User Contributions
|
648 |
487,268 |
07-06-2017, 08:47 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
We are not able to crack all hashes because we used the default options of wlancap2hcx:
-i : enable id check (default: disabled)
: default: disabled - you will get more ... |
|
ZerBea |
User Contributions
|
648 |
487,268 |
07-21-2017, 05:52 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Well, let's see how it works.
How about hcxkeys. Are you able to compile them? |
|
ZerBea |
User Contributions
|
648 |
487,268 |
07-22-2017, 08:03 PM |