hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
OK I understand about the ROGUE naming thank you.

How does hcxdumptool decide what MAC (BSSID) to use for an AP (ESSID) that a client is probing for if the real AP is not within range of the either the client or the penetration tester?

I assumed hcxdumptool just spoofed one.

I am guessing that the output from hcxhashtool --info= with regard to MAC addresses is not to be used for MAC tracing? I just thought that it was only the "ROGUE attack" AP MAC that was not genuine.

What do you think of the WPS test suggestion?

Thanks
Reply


Messages In This Thread
wlandump-ng vs hcxdumptool - by hulley - 02-10-2018, 10:26 PM
RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - by WPA_Catcher - 05-12-2020, 06:20 PM