hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: User Contributions (https://hashcat.net/forum/forum-25.html) +--- Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats (/thread-6661.html) |
RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - jimdimi - 11-15-2022 Hello, sorry for the newbie question but im looking to buy a laptop with a RTL8723BE 802.11 bgn wifi adapter. How can i know if hcxdumptool will work with its drivers? RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 11-15-2022 From README.md section Adapter: https://github.com/ZerBea/hcxdumptool "Not recommended WiFi chipsets (Broadcom, Intel, Realtek and Atheros), especially" RTL8723BE == Realtek chipset. RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - Runa - 11-17-2022 Hey, I really love your tools and had some great success with it. You really set a new standard for wifi-sec auditing! But I can't really figure out, how to run the server / client stuff with hcxdumptool. My current setup is a netbook with 4 wifi ifaces. Tried different approaches until I discovered the the server / client mode. My wrapper / script looks like this Code: # Kill NetworkMangler / wpa_supplicant I left the --ip blank, works too I'm assuming I don't need the -o ${CAPDIR}/$iface0.pcapng whith the clients since there will be only one cap, right? Do I even need any enable_status other than 256 for the clients? The logging would be redundant too, right? Tinkered so much I seem to be stuck in a rut. Can you point me in a general direction where I can read more about server / client? Thanks! RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 11-17-2022 I suggest to do some tests running two terminals (attached screenshot). It is important to start the CLIENT first Code: Terminal one -> hcxdumdptool in servermode Now play around with the status options until everything is shown as expected. Please notice: If the server - clients session is slow or timed out you run into a pselect() error which result in a heavy packet loss on the server. I do not recommend to use WiFi (overlapped channels) or bluetooth. RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - Runa - 11-17-2022 Awesome, thanks! Will test it today RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - drsnooker - 11-25-2022 I figured I'd post a feature request here.... I've been trying to figure out where to focus my efforts with those ZyXEL modems and managed to get access to a database with multiple caps. Now ZyXEL actually uses zyxel, Zyxel, ZyXEL and ZYXEL as ESSIDS. Would be possible to change the --essid-part option to case insensitive to catch all of these at once? Right now, I had to run hcxhashtool multiple times to get the four different case options for this particular vendor. RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 11-25-2022 @drsnooker Interesting feature request which will be a nice improvement. Let me think awhile how to add this. I guess I'll add a new option. After testing it against wpa-sec database I'll push the update (within they next few days). BTW: hcxdumptool (weak candidates in combination with hcxpcapng -R option) discovered some new kind of default PSKs: ZYXEL-?d?d?d:?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d and ZyXEL_KEENETIC_LITE_?H?H?H?H?H?H:zyxel-?d?d?d?d?d?d-cbd I have the firmware for the first one, but I have no time to dive into it and to add this to hcxpsktool. At the moment I'm working on all tools to move to the new EVP API (OpenSSL 3.0). The code changes are huge. RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 11-25-2022 That was less work than expected. By latest commit: https://github.com/ZerBea/hcxtools/commit/35b5d5d5904fba1fd6a54ce1b206e7a191aacaf7 this feature is added. Code: --essid-part=<part of ESSID> : filter by part of ESSID (case sensitive) Thanks for your effort. You're doing a great work. Please let me know if you need more options. RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 11-25-2022 Another one, discovered during this hcxhashtool tests on wpa-sec: ZyXEL_KEENETIC_LITE:zyxel-?d?d?d-?l?l?l I'm sure, running your feature request we get some more. RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 11-25-2022 Here is a new one: ZyXEL_KEENETIC_LITE_?H?H?H?H?H?H:?d?d?d?d?d?d?d?d The new option mutates the chain into a beast: hcxdumptool -> hcxpcapngtool (-R and -D option) -> hcxhashtool (-> hcxeiutool) -> hashcat/jtr |