![]() |
multicapconverter - all in one tool - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: User Contributions (https://hashcat.net/forum/forum-25.html) +--- Thread: multicapconverter - all in one tool (/thread-9585.html) |
multicapconverter - all in one tool - s77rt - 10-22-2020 Hi, multicapconverter is a portable python tool that you can use to convert your capture file to any of the hashcat supported formats. it was mainly based on the cap2hccapx tool, with more features added such as pcapng support and much more listed below Code: usage: multicapconverter.py --input capture.cap --export Features
Usage Examples We have a capture file 'capture.cap' which includes 4 handshakes: +---+-------------------+----------+---------------+ | # | BSSID | ESSID | AUTHENTICATED | +---+-------------------+----------+---------------+ | 1 | 00:00:00:00:AA:AA | Wifi | N | +---+-------------------+----------+---------------+ | 2 | 00:00:00:00:AA:AA | Wifi | Y | +---+-------------------+----------+---------------+ | 3 | 00:00:00:00:BB:BB | Internet | Y | +---+-------------------+----------+---------------+ | 4 | 00:00:00:00:CC:CC | Wifi | Y | +---+-------------------+----------+---------------+ By default the original c version write all the hccapx into one file no matter what. If you need a single separated handshake you will have to use a hex editor and take the required 393 bytes by yourself.. Well not anymore Also the original c version export all the handshakes even if they are not authenticated, in this python version it's a bit different, as the default is to ignore unauthenticated handshakes but can be exported by using the --all flag 1) Extract each handshake into a separated file (Auth Only) Code: python3 multicapconverter.py -i capture.cap --group-by handshake -x hccapx 2) Extract each handshake into a separated file (All) Code: python3 multicapconverter.py -i capture.cap --group-by handshake -x hccapx --all 3) Extract all handshakes into one file (just like the old c version) Code: python3 multicapconverter.py -i capture.cap --group-by none -x hccapx --all 4) Extract handshakes based on BSSID Code: python3 multicapconverter.py -i capture.cap --group-by bssid -x hccapx --all 5) Extract handshakes based on ESSID Code: python3 multicapconverter.py -i capture.cap --group-by essid -x hccapx --all 6) Extract handshakes based on ESSID having a specific BSSID Code: python3 multicapconverter.py -i capture.cap --group-by essid --filter-by bssid 00:00:00:00:CC:CC -x hccapx --all Miscellaneous
Extra If you are using Linux and you want to use the tool from different places (instead from only the working directory), simply copy the python script to your bin path: Code: sudo cp multicapconverter.py /usr/bin/ Now you can simply use multicapconverter, example: [ICODE]multicapconverter -i capture.pcapng -x hcwpax[/ICODE] TIPS
Source Code https://github.com/s77rt/multicapconverter/ RE: multicapconverter - all in one tool - s77rt - 04-26-2022 New version available. v1.2.0
https://github.com/s77rt/multicapconverter/ RE: multicapconverter - all in one tool - ZerBea - 04-26-2022 Great improvement. BTW: Now, there is an issue report regarding unset/zeroed SSID IE_TAGS in BEACON frames: https://github.com/kismetwireless/kismet/issues/419 RE: multicapconverter - all in one tool - s77rt - 04-27-2022 Thanks, Yeah i have been following on the discussion going on hcxtools RE: multicapconverter - all in one tool - ZerBea - 04-27-2022 Only the capturing tool sees what's going on, on a WiFi channel. Packets which are not recorded or filtered out by the capturing tool are lost forever (the demo cap submitted on multicapconverter git confirm this). Neither multicapconverter, nor hcxpcapngtool nor other conversion tools will be able to bring this packets back. |