New attack on WPA/WPA2 using PMKID - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: User Contributions (https://hashcat.net/forum/forum-25.html) +--- Thread: New attack on WPA/WPA2 using PMKID (/thread-7717.html) |
RE: New attack on WPA/WPA2 using PMKID - netgab_joe - 08-08-2018 (08-08-2018, 11:16 AM)atom Wrote: From what I've seen roaming one of the big new features in Fritz!OS7. Older versions Fritz!Box routers may not be vulnerable but new ones maybe. Since I do not have access to such a router I can't test myself. Thanks for sharing ... so there is consumer grade HW as well, that behaves badly However, my original statement is still valid: PMKID caching does not make sense in combination with WPA2 PERSONAL networks* (no functional benefit). The vendors should disable the announcement of PMKIDs in these SSID to mitigate this exploit (although the traditional "4-way handshake" capture exploit is still there). (*) Except a small benefit when using 802.11r RE: New attack on WPA/WPA2 using PMKID - kcdtv - 08-09-2018 I am still amazed by atom's full disclosure... Thinking that all world experts did have this just right under their eyes for years and that a single enthusiastic man put the finger into this is tremendous... I hope people do realize how amazing it is... I could sucessfuly get a PMKID on the very last SFR box (french ISP) Some friend (Xavi and josep345, thanks to them for their feedback) did some testing in Spain and untill now it is... 100% of tested models are vulnerable... (for us) They tested 4 models used by different ISP and all of them are vulnerable to the new method
Notice for example that the last model in the list is known as "livebox "Mi fibra"" and it is the router that uses orange for all its customers with optic fiber... we are speaking about more than one million of box like this... For those who have a chipset that is not supported by the hashcat tools, it is very easy to get the PMKID with wpa_supplicant itself It takes a couple of seconds to get the PMKID RE: New attack on WPA/WPA2 using PMKID - anonymousy - 08-09-2018 Hi all. When I try and run this I get "hcxdumptool: command not found". Is this likely to be a chipset issue or a Layer 8 issue?! RE: New attack on WPA/WPA2 using PMKID - undeath - 08-09-2018 (08-09-2018, 04:36 PM)anonymousy Wrote: Hi all. When I try and run this I get "hcxdumptool: command not found". Is this likely to be a chipset issue or a Layer 8 issue?! typical case of PEBKAC RE: New attack on WPA/WPA2 using PMKID - appleseed316 - 08-09-2018 Hi Hopefully not the wrong place to ask this but I cant get hashcat to decrypt the PSK. I have to use the windows version of hashcat as my linux box doesnt have GPUs in it. Anyhow my PSK is 8 characters long and I use the following to try crack it hashcat64.exe -m 16800 test.16800 -a 3 -w 3 '?d?d?d?d?d?d?d?d' The candidates are all 8 digits long so i am (wrongfully?) assuming the guess mask is right but it never finds it. fyi my psk is 11111111 Any ideas would be appreciated. RE: New attack on WPA/WPA2 using PMKID - malcolmputer - 08-09-2018 (08-04-2018, 06:50 PM)atom Wrote: The content of the written file will look like this: I tried the above WPA Supplicant method of obtaining the PMKID (which worked beautifully), so now I have the 32 char PMKID, and have the MAC of both the AP and the STA, but for some reason I can't figure out the format of the ESSID. My assumption is that it's the string of the SSID converted to hex, but I tried converting ed487162465a774bfba60eb603a39f3a back to a readable string to no success. Any suggestions on converting my known SSID (for example Linksys) to the right format for that final hex encoded bit? RE: New attack on WPA/WPA2 using PMKID - octf - 08-11-2018 My testing area has lots of Netgear and TpLink routers. By using either hcxdumptool or wpa_supplicant, I was unable to capture a single PMKID. So the vulnerability rate is 0% here. In case I'm being doing it wrong, here are the commands in use: hcxdumptool: hcxdumptool -o pca.pcapng -i wlan0mon --enable_status 15 wpa_supplicant: wpa_supplicant -c wpa.conf -i wlan0 -dd the wpa.conf is a blank file. RE: New attack on WPA/WPA2 using PMKID - soxrok2212 - 08-11-2018 A quick note about 802.11r... the new trend is "mesh" networking. Lots of homes are popping up with 2-3 APs all linked together so I guess it kinda does make sense. And I guess vendors would want to have seamless handoffs with repeaters as well (which they try to push so hard). RE: New attack on WPA/WPA using PMKID - altruskie - 08-11-2018 (08-05-2018, 12:54 AM)BeanBagKing Wrote: This looks amazing. did you ever get this to work with the --filterlist=<text file> ? I have been playing around with this and I discovered that if you remove the quotes in your text file, you can use the filter option without any issue. thought I would update if anyone else has run into this issue using the --filterlist option. RE: New attack on WPA/WPA2 using PMKID - ZerBea - 08-12-2018 (08-11-2018, 07:21 AM)octf Wrote: My testing area has lots of Netgear and TpLink routers. By using either hcxdumptool or wpa_supplicant, I was unable to capture a single PMKID. So the vulnerability rate is 0% here.
|