![]() |
hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: User Contributions (https://hashcat.net/forum/forum-25.html) +--- Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats (/thread-6661.html) |
RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 01-25-2021 Your assumption is correct. I noticed that, too. Some devices probe their entire NVRAM to hcxdumptool: Code: NVRAM RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ciccio17 - 02-13-2021 hi zerbea, hope all is good, sorry for this question not really related to hashcat or hcxdumptool.just a curiosity, will hcxdumptool work with ath10k driver, i really don't get that. some say that injection work some not. i never buy a device if hcxdumptool does not work, lol. RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 02-13-2021 I'm fine, thanks and I hope you're fine, too. First a general answer: hcxdumptool is working on every driver (e.g.: mt76, rt2800usb, ath9k) that is able to run full monitor mode, full packet injection, accept ioctl() system calls and doesn't depend on NETLINK. Unfortunately some drivers are hit by issues that (e.g. freeze/timeout on ath9k): https://bugzilla.kernel.org/show_bug.cgi?id=207397 Now to answer your question: atk10k will not work due to firmware/driver limitations: https://wireless.wiki.kernel.org/en/users/Drivers/ath10k Code: firmware does not support association to the same AP from different virtual STA interfaces (driver prints “ath10k: Failed to add peer XX:XX:XX:XX:XX:XX for VDEV: X” in that case) Please notice: We are talking about Linux kernel stock firmware/drivers https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tree/drivers/net/wireless?h=v5.10.15 and not about third party firmware/drivers/patches included in special penetration testing distributions (e.g.: K A L I). BTW: I do not use K A L I , because I'm not a penetration tester! I fully agree: I'll never buy a device if I know that the kernel stock driver doesn't support full monitor mode, full packet injection and ioctl() system calls. But some times I get a device to test some third party drivers, e.g. new rtw88 stack (Realtek): https://github.com/kimocoder/realtek_rtwifi If you are a Linux newbee (or an unexperienced K A L I user), I can't recommend to use third party or patched firmware/drivers, because you'll run into several issues (at the latest on a kernel update). A good start to get an information about driver, driver updates, issues and chipset: https://wireless.wiki.kernel.org/en/users/Drivers https://patchwork.kernel.org/project/linux-wireless/list/ https://bugzilla.kernel.org/ https://deviwiki.com/wiki/ But be warned: Manufacturers often change the chipset, but will use the same case and customary packing! RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - walterlacka - 02-24-2021 Hello ZerBea, when using hcxeiutool -h command and following the example listed at the bottom of the help, the last line of the example where it runs hashcat, is the "dump.pcapng" supposed to be "test.22000" instead? I'm assuming so, unless I'm missing something important. Thanks. RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 02-25-2021 Hi walterlacka. Thanks for reporting that ugly copy and paste error. Fixed by this commit: https://github.com/ZerBea/hcxtools/commit/8cc0d247c93d428d641abfbf4aa84b28af54dbf6 RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - sata - 03-30-2021 (07-22-2017, 10:07 AM)ZerBea Wrote: basic tutorial about the features to capture passwords from wlantraffic Hello ZerBea, I hope you are doing well. I tried to understand and reproduce this exact same procedure in hopes to recover the PSK if its present in the network traffic. As these tools are not available anymore because they are updated to the latest hcxtools, I am unable to reproduce this. Can you please update this exact tutorial using the latest set of hcxtools? regards. RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 03-31-2021 Thanks, I'm fine and I you you'll be fine, too. hcxtools > v6 and hcxdumptool making life a little bit more easier and received a lot of improvements, but the basics are the same (that include filter modes, filter lists and Berkeley Packet Filter). Only default formats changed to pcapng. capture traffic -> convert to hashcat (or john) hash format -> run hashcat (or john) The same applies to the attack vectors: attack vector 1 target AP (PMKID) attack vector 2 CLIENT (M2) attack vector 3 AP <-> CLIENT connection (PMKID, M1, M2, M3, M4) attack vector 4 EAP (EAP-ID, EAP TLS, RADIUS) or any combination of this. Code: attack vector 1, 2, 3, 4 (request EAP-ID, only) If you're an experienced user (you know what you're doing, you are able to create a BPF, you don't need a beautiful real time status display), I recommend to use hcxlabtool from the wifi_laboratory series. The basics of converting traffic to hashcat/john formats are the same, too, except that the default formats changed: hcxpcapngtool: default hash format now -> 22000 EAPOL + PMKID storing possible PSKs, received from WiFi traffic can be done by -E -I -U Example dump file is here: https://github.com/evilsocket/pwnagotchi/files/4328457/nctest.zip $ hcxpcapngtool -o eapol.22000 -E wordlist test.pcap $ hashcat -m 22000 --nonce-error-corrections=8 eapol.22000 wordlist In this example, we must use --nonce-error-corrections=8, because I converted the origin pcapng file to cap/pcap format (a few tools don't understand pcapng). This format is a very basic format and we loose some important information, stored in pcapng format. hcxhashtool is new. Depending on the options you can filter the output hash file. That can be done by bash tools, too, because 22000 is no longer a binary format. hcxeiutool is new. Depending on the options you can pre-process hcxpcapngtool -E -I -U output to a raw word list that can be used in combination with rules. RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - sata - 03-31-2021 (03-31-2021, 10:12 AM)ZerBea Wrote: Thanks, I'm fine and I you you'll be fine, too. Thanks for such detailed information, cleared a lot of doubts, much appreciated! However, when I run hashcat with attack mode 2200 ($ hashcat -m 22000 --nonce-error-corrections=8 eapol.22000 wordlist) I get an error message stating that there is no module named module_02200.dll (Cannot load module ./module/module_02200.dll). I have checked the modules directory and it is not there for some reason. I am using the default hashcat version 6.1.1 provided by hashcat.net on windows. Btw, also tested this with hashcat version 4.1.1, same error. RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 03-31-2021 Maybe you're running an old version of hashcat. hashcat 6.1.1 support 22000 and 22001. hashcat 4.1.1 is ancient. Code: $ hashcat -m 22000 --benchmark RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - sata - 03-31-2021 (03-31-2021, 06:37 PM)ZerBea Wrote: Maybe you're running an old version of hashcat. Thanks, I downloaded latest hashcat and installed it again, it worked! |