No, because we have to stay much longer on the channel do do this.
Besides:
AUTHENTICATION REQUEST, AUTHENTICATION RESPONSE,
ASSOCIATION REQUEST, ASSOCIATIONREPONSE
(each of them followed by an ACKNOWLEGE packet)
we need the following EAP sequence, too:
EAP REQUEST IDENTITY, EAP RESPONSE IDENTITY,
EAP REQUEST M1, EAP RESPONSE M1,
EAP REQUEST M2, EAP RESPONSE M2,
EAP REQUEST M3, EAP RESPONSE M3,
EAP REQUEST M4, EAP RESPONSE M4,
EAP REQUEST M5, EAP RESPONSE M5,
EAP REQUEST M6, EAP RESPONSE M6,
EAP REQUEST M7, EAP RESPONSE M7,
EAP REQUEST M8, EAP RESPONSE M8,
EAP REQUEST DONE, EAP RESPONSE ACK
(each of them followed by an ACKNOWLEGE packet).
Please read more here:
https://ifconfig.dk/pixiedust/
Additional we have to calculate several NONCE and HASH values
https://en.wikipedia.org/wiki/Diffie%E2%...y_exchange
As long as hashcat doesn't have a hash mode to recover the keys from this key exchange, it doesn't make sense to add it to hcxdumptool.
Please notice that every modern router is hardened against pixie dust attack.
Besides:
AUTHENTICATION REQUEST, AUTHENTICATION RESPONSE,
ASSOCIATION REQUEST, ASSOCIATIONREPONSE
(each of them followed by an ACKNOWLEGE packet)
we need the following EAP sequence, too:
EAP REQUEST IDENTITY, EAP RESPONSE IDENTITY,
EAP REQUEST M1, EAP RESPONSE M1,
EAP REQUEST M2, EAP RESPONSE M2,
EAP REQUEST M3, EAP RESPONSE M3,
EAP REQUEST M4, EAP RESPONSE M4,
EAP REQUEST M5, EAP RESPONSE M5,
EAP REQUEST M6, EAP RESPONSE M6,
EAP REQUEST M7, EAP RESPONSE M7,
EAP REQUEST M8, EAP RESPONSE M8,
EAP REQUEST DONE, EAP RESPONSE ACK
(each of them followed by an ACKNOWLEGE packet).
Please read more here:
https://ifconfig.dk/pixiedust/
Additional we have to calculate several NONCE and HASH values
https://en.wikipedia.org/wiki/Diffie%E2%...y_exchange
As long as hashcat doesn't have a hash mode to recover the keys from this key exchange, it doesn't make sense to add it to hcxdumptool.
Please notice that every modern router is hardened against pixie dust attack.