hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: User Contributions (https://hashcat.net/forum/forum-25.html) +--- Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats (/thread-6661.html) |
RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - v71221 - 12-27-2021 Hi, ZerBea! Merry Christmas and all the best for the coming 2022. It seems the last hcxdumptool commit is causing a segmentation fault. Probably today's commit. Previous worked Ok. Tested on the latest version of Arch Linux. it's enough to run hcxdumptool -i wlan0 --check_driver ath9k_htc in my case. RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 12-27-2021 Thanks for reporting that issue. More changes than expected were needed to detect the frequency by the decimal places. That included a nasty copy and paste error. It should be fixed by this commit: https://github.com/ZerBea/hcxdumptool/commit/a62a7451d720a494482fad518ec5ba0df4471471 Code: $ lsusb Have a good start into 2022 and a happy new year. See you again in 2022. RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - v71221 - 12-28-2021 I found that probably the easiest way for newbies to run hcxdumptool/hcxtools in Arch Linux is to use the Live USB. Perhaps this should be mentioned in the README.md https://wiki.archlinux.org/title/USB_flash_installation_medium The Live USB includes Midnight Commander, which makes it easy to use the CLI. Simply type mc After booting, I already have an ethernet configured and working. And can use the iwctl utility for WiFi. Then pacman -Sy pacman -S hcxdumptool You have installed hcxdumptool. Unfortunately, not the most recent version. To install the latest version: pacman -R hcxdumptool pacman -S git make pkg-config gcc Then follow the instructions on https://github.com/ZerBea/hcxdumptool git clone https://github.com/ZerBea/hcxdumptool.git cd hcxdumptool make make install You have installed the most recent version! BTW, do you have any idea why Hashcat v6.2.5 slower than v5.1.0 in my case? Please see here https://hashcat.net/forum/thread-10548.html RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 01-03-2022 I have no idea why v6.2.5 is slower in your case. Regarding my systems (GTX1060 and GTX1080Ti) everything is working as expected. Both cards are downclocked, because I neither run big word lists nor big masks or excessive rules. Mostly "Util" is only at 50% because I use hcxtools only to feed hashcat. Code: $ uname -r BTW: No need to mention that Arch is providing a live system, because nearly every distribution is doing that. Arch provide the latest tested version of hcxdumptool/hcxtools and hcxkeys. Whenever I release a new version, I flag the old one out, e.g.: https://archlinux.org/packages/?q=hcxtools hcxpsktool: get weak PSK candidates - learningnow - 01-30-2022 Hello community, I see from the manual that hcxpsktool can get weak PSK candidates. Forgive me for asking what may seem elementary but can some show an example of this. I have tried the following command on a .hc22000 file converted by hcxpcapngtool hcxpsktool --weakpass -o pskoutput -i test.hc22000 The 'pskoutput' file then contains a long list of strings. How to I leverage this info? what am I missing here? Thansk LL RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 01-30-2022 hcxpsktool calculate default key spaces based on ESSID, BSSID and analysis of wpa-sec submissions: https://wpa-sec.stanev.org/ In contrast to RouterKeyGen, that calculate a single PSK https://github.com/routerkeygen it calculate a range of possible PSKs to feed hashcat with. hcxpsktool is the missing tool between hashcat rule option and hashcat mask option. It is similar to hashcat's new -a9 option (calculate a word list based on the target): https://hashcat.net/forum/thread-9534-post-54596.html#pid54596 BTW: Your command line is not correct, because -i expect a binary hccapx file as input while -c expect hc22000 files You can pipe the calculated PSKs directly to hashcat or write them to a word list file (-o option), e.g: Code: $ hcxpsktool --weakpass | hashcat -m 22000 test.hc22000 Code: $ hcxpsktool --maconly -c test.hc22000 | hashcat -m 22000 test.hc22000 Code: $ hcxpsktool -c test.hc22000 | hashcat -m 22000 test.hc22000 Code: $ hcxpsktool --netgear | hashcat -m 22000 test.hc22000 example using -o output (useful in combination with hashcat checkpoint request and --session --restore in case of big PSK files): Code: $ hcxpsktool --netgear -o wordlist You can cascade all options (see --help for all options). To increase hashcat speed (in case of big hc22000 files), I recommend to filter the hc22000 files by hcxhashtool (tailored to target) before calculating PSK lists. That will keep the list small. RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - learningnow - 02-11-2022 Dear ZerBea, Thank you for taking the time to delineate such a clear and details explanation-I truly appreciate it! For fun and perhaps quick linking to a legacy tool, is there a way to pull a targeted *.cap file from a *.hcc22000 file? Many thanks LL RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 02-12-2022 Yes, hcxhash2cap will do this: Code: $ hcxhash2cap -h Please notice that it is not flawless. EAPOL MESSAGEPAIRs M2M3 (where EAPOL is taken from M3) can't be converted back to a cap file! RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - ZerBea - 03-19-2022 Excellent video how to use hcxdumptool -> hcxtools -> hashcat in practice (especially for beginners running K A L I): https://davidbombal.com/wifi-wpa-wpa2-cracking-with-hashcat-and-hcxdumptool/ It describe how to install the tools (by apt and by git) and how to use them. This is one of the best video tutorials I've ever seen! RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - hashserious - 03-29-2022 I have been using this tool since the beginning, intermittently. The default settings are noisy. Weird that i have to disable noisy attacks manually. Deauthentication as default is weirdest. At least there is --silent option. Thanks for making this tool. P.S. -h -> "do not run hcxdumtool on virtual machines or emulators" -> Missing "p". Just saying. |