hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
hcxpsktool calculate default key spaces based on ESSID, BSSID and analysis of wpa-sec submissions:
https://wpa-sec.stanev.org/

In contrast to RouterKeyGen, that calculate a single PSK
https://github.com/routerkeygen
it calculate a range of possible PSKs to feed hashcat with.

hcxpsktool is the missing tool between hashcat rule option and hashcat mask option. It is similar to hashcat's new -a9 option (calculate a word list based on the target):
https://hashcat.net/forum/thread-9534-po...l#pid54596

BTW: Your command line is not correct, because -i expect a binary hccapx file as input while -c expect hc22000 files

You can pipe the calculated PSKs directly to hashcat or write them to a word list file (-o option), e.g:
Code:
$ hcxpsktool --weakpass | hashcat -m 22000 test.hc22000
That will calculate a list of known weak default PSKs (retrieved by analysis of wpa-sec results)

Code:
$ hcxpsktool --maconly -c test.hc22000 | hashcat -m 22000 test.hc22000
This will calculate PSKs based on the BSSID

Code:
$ hcxpsktool -c test.hc22000 | hashcat -m 22000 test.hc22000
This will calculate PSKs based on the ESSID and BSSID

Code:
$ hcxpsktool --netgear | hashcat -m 22000 test.hc22000
This will calculate PSKs for NETGEARxx routers.

example using -o output (useful in combination with hashcat checkpoint request and --session --restore in case of big PSK files):
Code:
$ hcxpsktool --netgear -o wordlist
$ hashcat -m 22000 test.hc22000 wordlist

You can cascade all options (see --help for all options).

To increase hashcat speed (in case of big hc22000 files), I recommend to filter the hc22000 files by hcxhashtool (tailored to target) before calculating PSK lists.
That will keep the list small.
Reply


Messages In This Thread
wlandump-ng vs hcxdumptool - by hulley - 02-10-2018, 10:26 PM
RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - by ZerBea - 01-30-2022, 02:51 PM