01-22-2021, 09:51 PM
(02-06-2020, 01:57 PM)ZerBea Wrote: That is another amazing feature.
$ hcxpcapngtool -o test.22000 -E wordlist test.pcap
$ hashcat -m 22000 test.22000 wordlist
hcxdumptool attack vector against weak client, converted to pcap by tshark, so that you can test it running other tools, too:
what's the rationale behind this?
how come the password gets broadcasted as SSID in a probe request?
is it a common user mistake (input in the wrong form)?
It's common to see brobe requests with SSIDs that really look like passwords, sometimes with multiple variations like "passwd123", "passwd 123", "Passwd123" but I cannot explain their origin.
My best guess is that confused users trying to connect to a hotspot might be typing the password when asked for ESSID, but it amazes me that it could be such a frequent mistake.