Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
It just misses a field to send a pmkid hash :) |
|
Mem5 |
User Contributions
|
187 |
1,293,325 |
08-27-2018, 07:24 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
"hashcat -m 16800 82445.16800 -a 3 -w 3 '?l?l?l?l?l?lt!' "
Change the mask, or use wordlist. |
|
Mem5 |
User Contributions
|
187 |
1,293,325 |
09-21-2018, 09:39 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
HI ZerBea,
What do you mean by:
Quote:
--
hcxdumptool is able to prevent complete wlan traffic
--
Your tool send deauth packets in order to disconnect connected users?
So connected users need to con... |
|
Mem5 |
User Contributions
|
648 |
487,273 |
08-31-2018, 10:45 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Hi Zerbea,
From my own experience, using "hcxpcaptool (...) -I wordlist -E wordlist" and then hashcat on 'wordlist' never gave me any cracked password.
I have tested that on about 1000 unique ESSID (c... |
|
Mem5 |
User Contributions
|
648 |
487,273 |
06-08-2019, 01:01 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Here is my experiencce on 10'000 cap files, command line was :
Code:
--
hcxpcaptool -M imsilist -X clientprobelist -I wordlist -E wordlist -T trafficlist -g gpslist -U usernamelist -P pmklist --net... |
|
Mem5 |
User Contributions
|
648 |
487,273 |
06-08-2019, 01:32 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Burguerman Wrote: (06-23-2019, 10:03 PM)
--
I have heard thar there is a windows version of Hashcat. If so, could you post a link for downloading?
--
Have you checked www.hashcat.net ?! And then "h... |
|
Mem5 |
User Contributions
|
648 |
487,273 |
06-23-2019, 10:57 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Wondering if message pairs are still included, and easy to find/decode, in the new format?
M2M3 or M3M4 are good evidence that the password was correct. |
|
Mem5 |
User Contributions
|
648 |
487,273 |
01-12-2020, 12:43 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
Format 22000 is easily readable, just explained at the top of this thread :
ZerBea Wrote: (03-15-2020, 11:51 PM)
--
The format of a 22000 hashline is:
Code:
--
SIGNATURE*TYPE*PMKID/MIC*MACAP*MAC... |
|
Mem5 |
User Contributions
|
648 |
487,273 |
03-27-2020, 05:42 PM |
|
|
Thread: oclHashcat v1.20
Post: RE: oclHashcat v1.20
|
Mem5 |
Old oclHashcat Announcements
|
44 |
160,917 |
04-27-2014, 03:12 PM |
|
|
Thread: Cracking a p12 PFX certificate
Post: RE: Cracking a p12 PFX certificate
Elcomsoft distributed password already uses GPU, no ? |
|
Mem5 |
General Talk
|
17 |
140,999 |
06-27-2012, 08:26 PM |
|
|
Thread: Colliding password protected MS office 97-2003 documents
Post: RE: Colliding password protected MS office 97-2003...
Awesome ! Thank you !
Does it also work for Excel, PowerPoint 97-2003 password protected document ? Or only Word ? |
|
Mem5 |
User Contributions
|
36 |
134,711 |
09-09-2014, 08:19 AM |
|
|
Thread: Colliding password protected MS office 97-2003 documents
Post: RE: Colliding password protected MS office 97-2003...
|
Mem5 |
User Contributions
|
36 |
134,711 |
09-11-2014, 08:48 PM |
|
|
Thread: Colliding password protected MS office 97-2003 documents
Post: RE: Colliding password protected MS office 97-2003...
A question : why do we need to provide the mask (?b?b?b?b?b here) ? A collision does not need that for example the collider of mysql323 of tobtu.
Thanks |
|
Mem5 |
User Contributions
|
36 |
134,711 |
10-30-2014, 09:43 PM |
|
|
Thread: hashcat v3.00
Post: RE: hashcat v3.00
Many thanks again. Going to test it ASAP and will do feedbacks :) |
|
Mem5 |
hashcat
|
10 |
129,162 |
06-29-2016, 10:22 PM |
|
|
Thread: oclHashcat-plus v0.09
Post: RE: oclHashcat-plus v0.09
Thanks ! great release as always ! |
|
Mem5 |
Very old oclHashcat-plus Announcements
|
21 |
94,670 |
09-09-2012, 03:20 PM |
|
|
Thread: hashcat 6.0.0
Post: RE: hashcat 6.0.0
Awesome work, thanks to atom & team & contributors ! |
|
Mem5 |
hashcat
|
21 |
87,684 |
06-18-2020, 02:54 PM |
|
|
Thread: hashcat v4.0.0
Post: RE: hashcat v4.0.0
Again, thanks a lot atom & the team!
I will test it ASAP. |
|
Mem5 |
hashcat
|
11 |
86,633 |
10-27-2017, 10:59 PM |
|
|
Thread: LM hash support for OCLHC
Post: RE: LM hash support for OCLHC
To reduce a bit your list, you can look for all hashes which ends with
Code:
--
*AAD3B435B51404EE
--
It is obviously a LM hash, and the plain text is only < 7 (the second part is the null password)
|
|
Mem5 |
Feature Requests
|
31 |
77,621 |
08-28-2011, 12:21 PM |
|
|
Thread: LM hash support for OCLHC
Post: RE: LM hash support for OCLHC
atom, do you have any news about the crack of LM hashes in hashat or oclhashcat ? For future releases ?
Thanks |
|
Mem5 |
Feature Requests
|
31 |
77,621 |
01-01-2012, 02:32 PM |
|
|
Thread: LM hash support for OCLHC
Post: RE: LM hash support for OCLHC
|
Mem5 |
Feature Requests
|
31 |
77,621 |
02-02-2012, 11:56 PM |