added a new git repository: https://github.com/ZerBea/hcxtoolsbleeding
This is a playground and testarea for new/upcomming versions of hcxtools - use with care!
wlandump-ng (3. generation)
- dropped libpcap dependency
- instead use raw sockets (much faster then libpcap)
not all adapters support this(!)
tested with this adapters: https://hashcat.net/forum/thread-6661-po...l#pid37592
- write complete radiotap header to capture file (for offline GPS correlation)
- use encryption type of ap on existing connections
- dropped Berkeley Packet Filter (makes no longer sense on random generated mac's by newer devices)
- instead use host blacklist (do not send deauthentications to this networks)
- stop attack if handhshake is retrieved
- only attack ap's / clients in range
- refactored authentication sequence to retrieve again all M2's(!)
- retrieve parameters from ap's in range (beacons no longer needed)
Typical commandline:
$ wlandump-ng -s -c 1 -t 15 -2 -i <interface> -o output.pcap
or use with blacklist:
$ wlandump-ng -s -c 1 -t 15 -2 -i <interface> -o output.pcap -B blacklist
see help (-h) for more options
This is a playground and testarea for new/upcomming versions of hcxtools - use with care!
wlandump-ng (3. generation)
- dropped libpcap dependency
- instead use raw sockets (much faster then libpcap)
not all adapters support this(!)
tested with this adapters: https://hashcat.net/forum/thread-6661-po...l#pid37592
- write complete radiotap header to capture file (for offline GPS correlation)
- use encryption type of ap on existing connections
- dropped Berkeley Packet Filter (makes no longer sense on random generated mac's by newer devices)
- instead use host blacklist (do not send deauthentications to this networks)
- stop attack if handhshake is retrieved
- only attack ap's / clients in range
- refactored authentication sequence to retrieve again all M2's(!)
- retrieve parameters from ap's in range (beacons no longer needed)
Typical commandline:
$ wlandump-ng -s -c 1 -t 15 -2 -i <interface> -o output.pcap
or use with blacklist:
$ wlandump-ng -s -c 1 -t 15 -2 -i <interface> -o output.pcap -B blacklist
see help (-h) for more options