hcxdumptool - missing frames w/ filtering - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: hcxdumptool - missing frames w/ filtering (/thread-11212.html) |
RE: hcxdumptool - missing frames w/ filtering - ZerBea - 01-02-2023 mt7921u is a new driver: https://github.com/morrownr/USB-WiFi/issues/137 and we have to expect a lot of issues oon it. rtl8814au depend on NETLINK and hcxdumptool doesn't use NETLINK. AWUS036ACM is working fine. Please notice that the range on 5GHZ if less than half as on 2.4GHz. RE: hcxdumptool - missing frames w/ filtering - pipss - 01-03-2023 Thanks! I’ll try 36ACM RE: hcxdumptool - missing frames w/ filtering - ZerBea - 01-03-2023 A nice video is here: https://www.youtube.com/watch?v=Usw0IlGbkC4 RE: hcxdumptool - missing frames w/ filtering - pipss - 01-03-2023 Thanks again! I saw it already couple weeks ago. It was impressive, when i saw it, but when I tried to brute force my 10+ marks wpa2 password on v100 nvidia, i realized that video is actually “tricked”. How the hell he knows which mask for hashcat to use. If password is 8 marks w/ digits only, ok it took 30 min to brute force on v100 nvidia. RE: hcxdumptool - missing frames w/ filtering - pipss - 01-16-2023 Testing now ACM36 with stock antennas. First tried injection: Code: $ sudo hcxdumptool -i wlan0 --check_injection -c 6 After that turned off my AP and run hcxdumptool with essid list in beacon: Code: sudo hcxdumptool -i wlan0 -o dump.pcapng --enable_status=31 --essidlist=essid --active_beacon After that turned on AP and run hcxdumptool in standart mode: Code: sudo hcxdumptool -i wlan0 -o dump.pcapng --enable_status=31 While attacking clients. i got two hashes. While attacking AP got AP's one From all obtained hashes password was recovered. Question is what are the benefits of attacking client vs attacking AP? RE: hcxdumptool - missing frames w/ filtering - ZerBea - 01-16-2023 Nice to hear that it is working as expected. It is much easier to attack a weak CLIENT than a hardened ACCESS POINT. It is much easier to get within range of a mobile CLIENT than to get within the range of a stationary AP. In every case an EAPOL M2 of a CLIENT is unencrypted. You get a lot of useful information from EAP identity frames and undirected PROBEREQUEST frames coming from a CLIENT. Depending on the wpa-supplicant.conf of a CLIENT you'll get hashes of all(!) entries of this conf. You do not need nonce-error-corrections (hashcat --nonce-error-corrections=0) which speedup hashcat. Let us say you are a penetration tester and have received the order to check the security of a large company. You located the ACCESS POINT, attacked it and you got a PMKID and/or a 4way handshake. Next step is to run hashcat to check if the PSK of the Ap is weak. That will take a while and if it is not weak, you may think everything is well secured, because hashcat was not able to recover the PSK. Now run hcxdumptool and attack all CLIENTs connected to this AP. If only one CLIENT is weak (transmit PSK within PROBEREQUEST or EAP identity frame) you got the secured PSK, e.g.: If a user made a typo (type PSK insted of ESSID and ESSID instead of PSK). This information is now stored in its wpa-supplicant.conf and the device transmit the PSK in form of undirected PROBEREQUEST frames. The more CLIENTs the better the chance to identify a weak one and the entire company is compromised. BTW: The injection ratio and the antenna ratio depends on many factors: TX power of target (TX power of the attack device should always be the same as the TX power of the target devise) RX sensitivity of target RX sensitivity of attack device Frequency Antenna gain of target Antenna gain of attack device Fresnel zone Assignment of a radio channel (802.11 use time slots which allow a station to transmit or not) and more... hcxdumptool is measuring in both directions (attack device -> target and target -> attack device). If you run the injection test several times, you'll get several different results, depending on the parameters mentioned above which are highly unpredictable. But anyway, 802.11 is packet oriented and it is more enough if a few packets (mostly 3) reach the target and a few packets reach the attack device (mostly 3). RE: hcxdumptool - missing frames w/ filtering - ZerBea - 01-16-2023 I forgot to mention WiFi based IoT devices. A lot of them are weak (mostly due to wireless misconfiguration): WiFi based coffee machines, toothbrushes, bathroom scales, door bells, security cams, and much more...). hcxdumptool will help to identify the weak CLIENTs. RE: hcxdumptool - missing frames w/ filtering - pipss - 01-17-2023 I tried to attack CLIENTs while my AP is ON. Result is that no clients hashes were obtained, my AP hash only. Looks like attacking clients assume that they are must be out of the AP range, or AP must be off. Is that correct? RE: hcxdumptool - missing frames w/ filtering - ZerBea - 01-17-2023 That highly depend on command line options. Add your target ESSID to beaconlist and activate active beaconing Code: $ sudo hcxdumptool -i INTERFACE -o dump.pcapng --enable_status=63 --essidlist=beaconlist --active_beacon Code: start capturing (stop with ctrl+c) Explanation: A CLIENT will not leave the AP it is connected to, if it doesn't receive a BEACON advertising better conditions. And as a bonus, it will unhide a hidden ESSID. RE: hcxdumptool - missing frames w/ filtering - pipss - 01-17-2023 My code was exactly the same as when i attacked clients with my AP OFF: Code: sudo hcxdumptool -i wlan0 -o dump.pcapng --enable_status=31 --essidlist=essid --active_beacon Now to target my IoT coffemaker or other smart devices, they are always connected to my AP. So to effectively attack them do i need to be much close to them with my antenna, compare to they distance to the AP? |