hashcat Forum
hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Misc (https://hashcat.net/forum/forum-15.html)
+--- Forum: User Contributions (https://hashcat.net/forum/forum-25.html)
+--- Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats (/thread-6661.html)



RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 12-20-2017

Hi walterlacka.
No, there is no new general tutorial, as the basic functions are untouched. You can always run hcxtools using the default options. If your knowledge is higher, you can choose several additional options. They are explained in the help menu of each tool. Well, some of the tools are obsolete (like wlanresponse) and I removed them. Some tools are new (like wlandump-rs), because things changed (new authentication procedure, drop dependencies, some really good user ideas). I made a little post (only in this thread), everytime important things changed.
I described the basic TTPs (Tactics, Techniques and Procedures) once and they didn't change since this time.
So it's enough, to follow this thread to understand the new features and, of course, the basics.
I admit, it is not easy to use hcxtools. Well, see it as a WiFi playground to expand your knowledge (and I mean learning by doing).

And last, but not least:
The main penetration distros added hcxtools to their repositories and keep them up to date:

http://mirror.easyname.at/blackarch/blackarch/os/x86_64/
hcxtools-609.b485155-1-x86_64.pkg.tar.xz 17-Dec-2017 16:01 96K

https://en.The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali).tools/all/?tool=1779
Last Updated: 2017-12-17

There is also a nice post in an other forum written by freeroute:
https://forum.hashkiller.co.uk/topic-view.aspx?t=21036&m=155465#155465


If you're interested in the whole stuff, I suggest you to read this elementary basics:
https://en.wikipedia.org/wiki/Intelligence_cycle
https://en.wikipedia.org/wiki/Signals_intelligence
https://en.wikipedia.org/wiki/Traffic_analysis
https://en.wikipedia.org/wiki/Coding_theory
https://en.wikipedia.org/wiki/Cryptanalysis
and that (google for CWAP_WLAN_ANALYSIS.pdf):
Certified Wireless Analysis Professional Official Study Guide


RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 12-20-2017

Hi DKblue.
Again thanks and all my best season greetings


RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ee10 - 12-22-2017

In wlanhcx2ssid, what's the difference between -n and -D?


RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 12-22-2017

Hi ee10.
You're too fast for me (asking this question). Added this option yesterday, but didn't have the time to write a post.

wlancap2hcx
added new option to remove handshakes that that belong to the same authentication sequence
-D        : remove handshakes that belong to the same authentication sequence
         : you must use nonce-error-corrections on that file!

wlanhcx2ssid
added new option to remove handshakes that that belong to the same authentication sequence
-D <file> : remove handshakes that belong to the same authentication sequence
         : you must use nonce-error-corrections on that file!

The new option -D remove all duplicate handshakes that are captured within the lease time of an EAPOL timer.
The options -n and -N remove all duplicates and keep one handshake each mac_ap, mac_sta, essid, message_pair combination (-N) or one handshake each mac_sta, essid combination (-n). They doesn't take care about the lease time!

-D removes less duplicates than -n or -N, but will keep the following:
- client tries to connect to the access point using the half of his password, then he tries to connect using the complete password
- access point / client changed the password during the capture time
- user merged two or more  different caps before he convert them to hccapx

-n or -N only keeps one of this handshakes and remove the other ones.

If you have enough gpu power or enough time, it's better to choose option -D.

The new option is designed on demand of wpa-sec.stanev.org to prepare incoming caps for the database (remove dupplicates, but keep all the gems). wpa-sec.stanev.org is on his way to finish the migration to hashcat 4.0.1 and need this option to reduce the size of the database, but keep important handshakes (the gems).  We can not assume that all handshakes in a submitted cap belong to the same authentication sequence in range of the lease time of an EAPOL timer (so we need -D).

Let's take a look on this example on a merged cap containing handshakes from 2 different EAPOL lease times:
$ wlanhcx2ssid -i complete.hccapx -D rem1.hccapx
2654 records read from complete.hccapx
2267 records removed
387 records written


$ wlanhcx2ssid -i complete.hccapx -N rem2.hccapx
2654 records read from complete.hccapx
363 records written to rem2.hccapx

$ wlanhcx2ssid -i complete.hccapx -n rem3.hccapx
2654 records read from complete.hccapx
273 records written to rem3.hccapx

Option -D keeps 24 handshakes captured from different lease times (you must enable at least default nonce-error-corrections).
Option -N removed them too, but take care of the message_pair.
Option -n removed more and doesn't take care of the message_pair (you must use high nonce-error-corrections values)

Option -D wlancap2hcx is similar to option -D wlanhcx2ssid (same source code).

And, as you can see, every single option of hcxtools has a price tag. If you choose this option, you have to pay the price.


RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ee10 - 12-22-2017

You are awesome. I love your software. Thank you so much.


RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - DKblue - 01-01-2018

Happy newyear ZerBea !
I 've got the disable NetworkManager scripts to run!
That's not easy for me ,I referenced your example code  and googled word by word these 2 weeks.
Finaly here it is
#!/bin/sh
sudo systemctl stop NetworkManager.service
sudo systemctl stop wpa_supplicant.service

sudo ip link set wlan0 down
sudo iw dev wlan0 set type monitor
sudo ip link set wlan0 up
sudo iw dev wlan0 info
Now it's more easier to use your hcxtools.
Thanks again
Bye


RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 01-04-2018

Hi DKblue
Happy New Year.
Nice to read, that you are able to put your device into monitor mode.


RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 01-04-2018

Hi JuanBerta.
I really like the arg-wireless forum and pushed wlangenpmkocl stdin/stdout update:
$ wlangenpmkocl -h
wlangenpmkocl 4.0.1 (C) 2018 ZeroBeat
usage: wlangenpmkocl <options>
cat wordlist | wlangenpmkocl -e <essid> | hashcat -m 2501 ...

options:
-e <essid> : input single essid (networkname: 1 .. 32 characters) requires -p
-p <password> : input single password (8 .. 63 characters) requires -e
-i <file> : input passwordlist
-I <file> : input combilist (essid:password)
-a <file> : output plainmasterkeys as ASCII file (hashcat -m 2501)
-A <file> : output plainmasterkeys:password as ASCII file
-c <file> : output cowpatty hashfile (existing file will be replaced)
-P <platform> : input platform, default 0 (first platform)
-D <device> : input device, default 0 (first device)
-l : list device info
-h : this help


RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 01-05-2018

Hi JuanBerta.
Fixed and pushed.

Now mixed mode (stdin/stdout/options) is possible:

$ wlangenpmkocl -h
wlangenpmkocl 4.0.1 (C) 2018 ZeroBeat
usage: wlangenpmkocl <options>

options:
-e <essid>    : input single essid (networkname: 1 .. 32 characters) requires -p
-p <password> : input single password (8 .. 63 characters) requires -e
-i <file>     : input passwordlist
-I <file>     : input combilist (essid:password)
-a <file>     : output plainmasterkeys as ASCII file (hashcat -m 2501)
-A <file>     : output plainmasterkeys:password as ASCII file
-c <file>     : output cowpatty hashfile (existing file will be replaced)
-P <platform> : input platform, default 0 (first platform)
-D <device>   : input device, default 0 (first device)
-l            : list device info
-h            : this help

examples of stdin/stdout usage:
cat wordlist | wlangenpmkocl -e <essid> | hashcat -m 2501 ...
cat wordlist | wlangenpmkocl -e <essid> > <pmklist>
or use classic mode:
wlangenpmkocl -e <essid> -i <wordlist> -a <pmklist>
or use mixed mode:
wlangenpmkocl -e <essid> -i <wordlist> > <pmklist>


wlandump-ng command not working for me - hulley - 01-06-2018

Hello Good Day!
I been using wlandump-ng a few weeks, and been trying to get this command working

[ wlandump-ng -i wlan1 -o test.cap -c 1 -t 120 -R -B -s ]

when I tried, it works for 30 second or so and then do nothing, I wait and it never change channel either. when I remove '-R' it works, but I would like to get -R working. (when ever I put -D or -R in a command nothing works) Does anyone have any clue whats might be wrong?

Here is my system info:

The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali)-linux-2017 2-i386 on laptop-PC
hcxtools 4.0.1

Alfa Network 802.11 B/G/N Wireless USB Network Adapter (AWUS036NHR V.2)

phy1 wlan1 rtl8192cu Realtek Semiconductor Corp. RTL8188RU 802.11n WLAN Adapter

root@pentest:~# ./makemonnb
elect WLAN interface: wlan1
deactivating NetworkManager and wpa_supplicant
activating monitor mode on wlan1
Interface wlan1
ifindex 4
wdev 0x100000001
addr xx:xx:xx:xx:xx:xx
type monitor
wiphy 1
channel 1 (2412 MHz), width: 20 MHz (no HT), center1: 2412 MHz
txpower 20.00 dBm
___
???