07-04-2017, 08:24 AM
New update https://github.com/ZerBea/hcxtools
added support for new hashcat hash-mode 2501 = WPA/WPA2 PMK
hcxtools are now able to capture and save possible plainmasterkeys (PMK) from wlantraffic
To test if your captured networks are vulnerable use wlancap2hcx option -f to save captured pmk's to a file
wlancap2hcx: -f <file> : output possible wpa/wpa2 pmk list (hashcat -m 2501)
pmks are appended to existing file
Now, you have four options to collect possible passwords:
1. collect networknames (using the same 802.11 frame) and passwords:
-e <file> : output wordlist to use as hashcat input wordlist
2. collect networknames (using the same 802.11 frame) and passwords (unicode):
-E <file> : output wordlist to use as hashcat input wordlist (unicode)
3. collect usernames, domains,identities (used by the authentification - system):
-u <file> : output usernames/identities file
4. collect plainmasterkeys for use with hashcat hash-mode -m 2501:
-f <file> : output possible wpa/wpa2 pmk list
it's possible that networknames (= 32) chars are converted to a pmk (64 hexadecimal)
because they are using the same 802.11 frame
Collect from all captures and run hashcat at regular intervals on that files.
Cheers
added support for new hashcat hash-mode 2501 = WPA/WPA2 PMK
hcxtools are now able to capture and save possible plainmasterkeys (PMK) from wlantraffic
To test if your captured networks are vulnerable use wlancap2hcx option -f to save captured pmk's to a file
wlancap2hcx: -f <file> : output possible wpa/wpa2 pmk list (hashcat -m 2501)
pmks are appended to existing file
Now, you have four options to collect possible passwords:
1. collect networknames (using the same 802.11 frame) and passwords:
-e <file> : output wordlist to use as hashcat input wordlist
2. collect networknames (using the same 802.11 frame) and passwords (unicode):
-E <file> : output wordlist to use as hashcat input wordlist (unicode)
3. collect usernames, domains,identities (used by the authentification - system):
-u <file> : output usernames/identities file
4. collect plainmasterkeys for use with hashcat hash-mode -m 2501:
-f <file> : output possible wpa/wpa2 pmk list
it's possible that networknames (= 32) chars are converted to a pmk (64 hexadecimal)
because they are using the same 802.11 frame
Collect from all captures and run hashcat at regular intervals on that files.
Cheers