hashcat & hcxdumptool ioctl(SIOCSIWMODE) - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: hashcat & hcxdumptool ioctl(SIOCSIWMODE) (/thread-11855.html) Pages:
1
2
|
hashcat & hcxdumptool ioctl(SIOCSIWMODE) - jairu - 03-15-2024 Hello all, I installed hashcat and hcxdumptool from Ubuntu 22.04: $ sudo dpkg -l | grep hashcat ii hashcat 6.2.5+ds1-2 amd64 World's fastest and most advanced password recovery utility ii hashcat-data 6.2.5+ds1-2 all Data files for hashcat advanced password recovery utility $ sudo dpkg -l | grep hcxdump ii hcxdumptool 6.2.5-2 amd64 Small tool to capture packets from wlan devices However, when I try to run the command: $ sudo hcxdumptool -i wlan1 -o dumpfile.pcapng --active_beacon --enable_status=15 I get this: initialization of hcxdumptool 6.2.5... failed to set monitor mode, ioctl(SIOCSIWMODE) not supported by driver: Operation not permitted warning: failed to init socket terminating... 1 driver error encountered failed to restore old SIOCSIWMODE: Operation not permitted I currently have this adapter: Bus 003 Device 002: ID 0bda:8812 Realtek Semiconductor Corp. RTL8812AU 802.11a/b/g/n/ac 2T2R DB WLAN Adapter Should I try to download and install from source the latest versions of hashcat and hcxdumptool? RE: hashcat & hcxdumptool ioctl(SIOCSIWMODE) - jairu - 03-16-2024 When doing additional research I found the following: Quote:$ ethtool -i wlan1 RE: hashcat & hcxdumptool ioctl(SIOCSIWMODE) - ZerBea - 03-17-2024 Older versions (< 6.3.0) of hcxdumptool use WIRELESS EXTENSIONs (WEXT) to control the device via ioctl() system calls. RTL88xxau is a NETLINK only driver that does not support WEXT. Starting with version 6.3.0 hcxdumptool moved to NETLINK (because WEXT is deprecated) and it should work, now. https://github.com/ZerBea/hcxdumptool/blob/3693e7721ac61b893d948add620de76d90749ed6/changelog#L167 Please notice that the your driver is an out of Linux tree driver which is not part of the official Linux kernel. More information about this third party drivers is here: https://github.com/morrownr/USB-WiFi/issues/314 RE: hashcat & hcxdumptool ioctl(SIOCSIWMODE) - jairu - 03-18-2024 I see @ZerBea, Thank you very much for the information. I am not sure I am following what I need to do next to confirm the driver works, please correct me if I am wrong: 1. I need to download a newer/different version of the driver RTL88xxau, is there an official github page with the latest versions/release notes of these drivers? 2. I also need to make sure the driver I install is not part of the Linux Kernel tree? Ho do I accomplish this? by installing the correct driver? I will be investigating myself in the meantime. Thank you again! RE: hashcat & hcxdumptool ioctl(SIOCSIWMODE) - ZerBea - 03-18-2024 There are hundreds of third party drivers out in the wildness. Some of them support monitor mode, some of them support packet injection, some of them are old and some of them are well maintained. Maybe this one will work for you: https://github.com/aircrack-ng/rtl8812au But the issue list is long: https://github.com/aircrack-ng/rtl8812au/issues BTW: I can't and I won't test all this third party drivers. That is the reason why I recommend Linux stock kernel drivers. https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tree/drivers/net/wireless?h=v6.8.1 If you buy a device that need an out of tree driver you will run into problems, at the latest with the next Linux kernel update. RE: hashcat & hcxdumptool ioctl(SIOCSIWMODE) - jairu - 03-19-2024 Hello @ZerBea, Noted and thank you so very much for your response and advise. I will check the driver you shared and also look into Linux Stock Kernel Drivers. One thing though, I thoguht in the previous message you commented that the driver I was using was one of the Linux Kernel Drivers? In any way, I will check the issues list, and then verify the type of driver I am currently using. Again, Thank you! this information and links are very helpful, and I appreciate it. Sincerely, RE: hashcat & hcxdumptool ioctl(SIOCSIWMODE) - ZerBea - 03-19-2024 Maybe I explained it in a misleading way: Your driver is a third party driver which is not part of the official Linux kernel. The source of your driver is unknown, as well as monitor mode and frame injection capabilities. Your driver is a NETLINK driver that does not support WEXT. As a result, ancient drivers and tools will not work (as expected). That shouldn't be a problem, because hcxdumptool (>= 6.3.0) moved completely to NETLINK. To identify tools take a look at dmesg log: Code: $ sudo dmesg | grep extensions If you see something like this, the tool is using deprecated WEXT: Code: [143049.646937] warning: `xxxxxxxxx' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 This warning should not appear on hcxdumptool >= 6.3.0. Some more information about WIRELESS EXTENSIONS (WEXT): https://wireless.wiki.kernel.org/en/developers/Documentation/Wireless-Extensions RE: hashcat & hcxdumptool ioctl(SIOCSIWMODE) - jairu - 03-19-2024 Thank you again @ZerBea, This is what I see on my end: $ sudo dmesg | grep extensions [ 84.575399] warning: `megasync' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 I will definitely continuing testing and reviewing the settings and check again if hashcash works. RE: hashcat & hcxdumptool ioctl(SIOCSIWMODE) - ZerBea - 03-19-2024 Looks like some tools still use WEXT. But that has nothing to do with the driver. A quick and dirty test of the aircrack-ng driver: Complies and inserts fine running Linux kernel 6.8.1: Code: $ uname -r Running hcxdumptool latest git head: Code: $ hcxdumptool -v Driver information: Code: $ hcxdumptool -l Test target has been (successful) attacked in 6,403s (that include the time to init the device - this device is really slow): Code: $ time hcxdumptool -i wlp22s0f0u4 --bpf=target.bpfc -c 10a --rds=1 --exitoneapol=7 -w test.pcapng Successful converted by hcxpcapngtool: Code: $ hcxpcapngtool -o test.hc22000 test.pcapng PSK has been sucessful recovered by hashcat: Code: $ hashcat -m 22000 test.hc22000 -a 3 12345678 That is the way as described in hashcat wiki: https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2 RE: hashcat & hcxdumptool ioctl(SIOCSIWMODE) - jairu - 03-21-2024 @ZerBea, Excellent, I will proceed with testing that and respond with the result, I really appreciate the details! Sincerely, |