Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
As diegodieguex noticed, that function is allready in hcxtools (whoismac) implemented. hcxpcaptool is a conversion tool, only. It will show basic informations about the capture file. But I think about... |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
09-03-2018, 06:19 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Hi marcou3000.
Mem5 gave you a good advice and I recommend to follow his advice!
hashcat -m 16800 -w 3 82445.16800 -a 3 ?l?l?l?l?l?lt!
should do the job
It's also important to check your atta... |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
09-21-2018, 11:29 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
From the WikiDevi:
Supported modes:
STA (Station) mode: supported
IBSS (Ad-Hoc) mode: supported
AP (Master) mode: supported
Mesh (802.11s) mode: supported
P2P mode: supported
Monitor mode: su... |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
09-22-2018, 06:31 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
"file or directory not found"
means that there is no file test.pcapng in that directory.
Just do a
$ ls
to see what files are present. |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
09-27-2018, 05:52 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
@Superninja
It is not a good idea to copy hcxtools source and hcxdumptool source into the same directory.
Also it is not a good idea to use this directory as your working directory.
If you are a be... |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
09-30-2018, 05:09 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
The Wiki is a good place to get some answers:
https://hashcat.net/wiki/doku.php?id=mask_attack
But keep in mind that this (PBKDF2) is a slow process. A mask only make sense if you know a part of t... |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
10-01-2018, 08:09 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
> wanted try, but wpasec accept only cap format.
No! wpa-sec running hcxtools in background.
Accepted formats are: cap, pcap, pcapng and gzip compressed cap, pcap and pcapng.
Just upload your capt... |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
10-02-2018, 11:59 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
That's ok. It's just a warning, that you will not get full advantage of your GPU. |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
10-02-2018, 08:15 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
This questions are allready answered:
https://hashcat.net/forum/thread-7717-post-41863.html#pid41863
https://hashcat.net/forum/thread-7717-post-41864.html#pid41864
To understand hcxtools and hcxd... |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
10-30-2018, 11:02 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Read errors mean that the pineapple possible not shutting down correctly. We miss the final interface statistics block. It doesn't mean that the hash is uncrackable. To find out, what's going wrong, w... |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
11-16-2018, 10:20 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
But both pcapng files are usefull for me. I noticed an issue in combination with mips and will try to fix it. Please give me a few minutes to fix it. v2.pcapng doesn't contain handshakes or PMKIDs. |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
11-17-2018, 12:28 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
No, this PMKIDs belong to this ESSIDs:
Birdy
Slow Wifi
Your target network wasn't captured.
You can run whoismac to get informations about the 16800 hashline:
whoismac -p |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
11-17-2018, 01:27 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
If you want to use hcxdumptool to caputure wlan traffic, please note that your WiFi adapter must support this. Not all drivers support this. This is a list of chipsets, known as working "out of th... |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
08-06-2018, 07:15 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Some statistics:
Session..........: hashcat
Status...........: Quit
Hash.Type........: WPA-PMKID-PBKDF2
Hash.Target......: 16800.txt
Time.Started.....: Wed Aug 8 12:16:43 2018 (10 secs)
Time.... |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
08-08-2018, 12:18 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
octf Wrote: (08-11-2018, 07:21 AM)
--
My testing area has lots of Netgear and TpLink routers. By using either hcxdumptool or wpa_supplicant, I was unable to capture a single PMKID. So the vulnerabi... |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
08-12-2018, 01:34 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Well, it doesn't make sense to attack dynamically derived PMKs, but it's really funny.
I did a small update on hcxtools.
Download example cap from here:
https://wiki.wireshark.org/SampleCaptures... |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
08-13-2018, 11:25 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
Well, it is a new attack vector and a nice playground.
Take a look at the statistics of a typical hcxdumptool pcapng file. I got this one from a tester:
summary:
file name....................:... |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
08-16-2018, 10:05 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
That are some good news.
Well, UBUNTU is recommended by hashcat team and is an easy to use distribution. I share that opinion. Designed for complete novices, UBUNTU teaches a beginner everything he n... |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
08-16-2018, 02:19 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
hcxdumptool is able to run different attack vectors. And the client-less (PMKID) attack vector is only one of them:
ap-less:
Only one packet (M2) from a client required. You do not need to hunt fo... |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
08-17-2018, 10:51 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
You're running an old version. Please pull latest git commit.
Filter lists are only used in the transmission branch. Using a filter list means, that we run active attacks against the entries (filterm... |
|
ZerBea |
User Contributions
|
187 |
1,293,061 |
08-21-2018, 10:22 AM |