New attack on WPA/WPA2 using PMKID - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: User Contributions (https://hashcat.net/forum/forum-25.html) +--- Thread: New attack on WPA/WPA2 using PMKID (/thread-7717.html) |
RE: New attack on WPA/WPA2 using PMKID - ZerBea - 09-22-2018 Hi marcou3000. There can be different reasons: 1) To much power consumption of an USB high gain adapter (for example AWUS036NH connected to an USP port of a Raspberry PI) - in that case reduce power output to 20dBm. 2) Runing hcxdumptool on a virtual interface like monX or wlanXmon 3) Interface isn't fully set into monitor mode 4) Not all services that take access to the device are stopped 5) Unsupported driver (Intel, Broadcom, some Atheros). From the bug tracker, I noticed that most of the issues (nearly all of them) are related to K*A*L*I (btw, the same applies to hashcat). Only a few issues are related to UBUNTU or Debian (NetworkManager and/or wpa-supplicant active on the same physical interface like hcxdumptool). No issues related to the recommended operating system Arch Linux and the recommended drivers. BTW: you can check how the access to the physical interface works: - set your interface to monitor mode (by iw and ip commands) - run wireshark and capture traffic from that physical interface - start hcxdumptool on that physical interface Now you can notice that hcxdumptool disconnect wireshark from the physical interface. That will not work if they are running on different virtual interfaces. It's important to choose a network adapter with good driver support (stable, full monitor mode support incl. injection capabilities). Read more here: https://wireless.wiki.kernel.org/en/users/drivers Do not trust in the technical VENDOR information. Sometimes they change the chipset (if you're lucky, they choose a different version number xxx.1 or rev. b). aircrack-ng suite is much better to use by inexperienced users than hcxdumptool/hcxtools/hcxkeys. The suite supports more operating systems and more interface adapters and is easier to use (for example airmon-ng to set monitor mode). hcxdumptool/hcxtools/hcxkeys are analysis tools and parsing tools (next to the conversation, we also do some kind of pre-hashing) for hashcat and JtR. They are designed to discover weak points within the system (and they do this very well: PMKID attack vector, nonce-error-corection, ...). There is a feature request to implement PMKID attack vector: https://github.com/aircrack-ng/aircrack-ng/issues/1937 There is also a feature request to solve the zeroed timestamp issue: https://github.com/aircrack-ng/aircrack-ng/issues/1958 So I'm sure, we find this features in the next aircrack-ng version. RE: New attack on WPA/WPA2 using PMKID - marcou3000 - 09-22-2018 I'm using laptop dual boot Debian 9 with Alfa Awus036NHA and RTL8723AE RE: New attack on WPA/WPA2 using PMKID - ZerBea - 09-22-2018 From the WikiDevi: Supported modes: STA (Station) mode: supported IBSS (Ad-Hoc) mode: supported AP (Master) mode: supported Mesh (802.11s) mode: supported P2P mode: supported Monitor mode: supported Packet injection: unknown read more here: https://wikidevi.com/wiki/Rtl8723ae hcxdumptool require fully functional packet injection, but status of this driver is unknown. RE: New attack on WPA/WPA2 using PMKID - marcou3000 - 09-22-2018 Problem solved, it was the wpa-supplicant. Thank you RE: New attack on WPA/WPA2 using PMKID - Superninja - 09-23-2018 Hello, after i read about problems with The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali), i installed ubuntu in virtual box. I am using Awus036NHR with RTL8188RU Chipeset For monitor mode i use iplink now. and "sudo iw dev" show me that i am in monitor mode Also changed enable_status=3 targed AP is in range. But now more bad, it look like it doesnt scan, after start, the main message "start capturing" comes, but thats all, no scan results, nothing. Maybe RTL8188RU chipset is not compatible? see you (09-07-2018, 04:55 AM)dafez Wrote:(09-03-2018, 06:10 PM)diegodieguex Wrote: maybe this helpI appreciate it thanks. (09-18-2018, 06:37 PM)ZerBea Wrote: Hi Superninja RE: New attack on WPA/WPA2 using PMKID - ZerBea - 09-23-2018 Read more here: https://wikidevi.com/wiki/Rtl8xxxu Supported modes STA (Station) mode: supported IBSS (Ad-Hoc) mode: unknown AP (Master) mode: unknown Mesh (802.11s) mode: unknown P2P mode: unknown Monitor mode: unknown Packet injection: unknown That applies to RTL8188EU, RTL8188RU, RTL8191EU, RTL8192EU, RTL8723AU, RTL8723BU There are two firmware versions (v1 and v2) And from several google hits: https://www.google.de/search?source=hp&ei=1F6nW6ukAYWjsgHXvYjwDg&btnG=Suche&q=RTL8188RU+monitor+mode Alfa Adapters – AWUS036NHR V2 -AVOID!! Note the chipset – RTL8188RU. This chipset is known to have issues. Beini 1.2.3 built for RTL8188RU Even though this was built especially for my chipset I had massive problem with this. This might be because it's pretty outdate. I was able to put my card into monitor mode but when scanning for networks, I couldn't pick up any AP's RE: New attack on WPA/WPA2 using PMKID - cashhat - 09-26-2018 Am I doing this right? Step 0: Device is in monitor mode: Code: $ iw dev Step 1: hcxdumptool: Code: $ hcxdumptool -o test.pcapng -i mon0 --enable_status=1 This doesn't seem to work no matter how long it runs. But this does: Code: $ nmcli d connect wlp9s0 That only works if you run nmcli d connect wlp9s0 right before running hcxdumptool. But as you can see it does find a PMKID. It generates three test.pcapng files (test.pcapng, test.pcapng-0, test.pcapng-1). I've tried using all three files without any success. Step 3: hcxpcaptool -z test.16800 test.pcapng Code: 192mf83df23fae35dj6cfa19dj72903j*20fkehi8ejfe*fmj3289urfe3*fjo3i13893u21jfi3723 Step 4: hashcat -m 16800 test.16800 -a 3 -w 3 '?l?l?l?l?l?lt!' Code: Approaching final keyspace - workload adjusted. It's going wrong somewhere but I can't tell where. RE: New attack on WPA/WPA2 using PMKID - diegodieguex - 09-27-2018 whoismac -h -p <hashline> : input PMKID hashline - - - - - for i in $(cat ~/Desktop/PMKID.txt); do whoismac -p $i; done wrong ESSID fjo3i13893u21jfi3723 wrong ESSID fo2309ifjewo8ewyuroe wrong ESSID o390jfro2309d34243fj - - - - - echo fjo3i13893u21jfi3723 | xxd -r -p â!7# echo fo2309ifjewo8ewyuroe | xxd -r -p # é echo o390jfro2309d34243fj | xxd -r -p 9# ”BC RE: New attack on WPA/WPA2 using PMKID - slyexe - 09-27-2018 (09-26-2018, 09:50 PM)cashhat Wrote: Am I doing this right? You do not want a virtual interface (mon0). You are not doing it right. Setup your wireless interface into monitor mode: Code: ifconfig wlp9s0 down Then check that its in monitor and not managed with iwconfig wlp9s0. Once the wireless interface is in monitor mode AND SUPPORTS IT, then you can use: Code: hcxdumptool -i wlp9s0 -o test.pcapng --enable_status 1 Should solve your issue. RE: New attack on WPA/WPA2 using PMKID - Superninja - 09-27-2018 Hello there, so i use other adapter, with rt3070, and it look likes it works. got pmkid. But now it convert not the file to pcapng i wrote: hcxpcaptool -z test.16800 test.pcapng cat test.pcapng and get error : "file or directory not found" it look likes it convert not the file, even i get no error...hmh sorry for so much question, i am still learning :-) |