hcxpsktool calculate default key spaces based on ESSID, BSSID and analysis of wpa-sec submissions:
https://wpa-sec.stanev.org/
In contrast to RouterKeyGen, that calculate a single PSK
https://github.com/routerkeygen
it calculate a range of possible PSKs to feed hashcat with.
hcxpsktool is the missing tool between hashcat rule option and hashcat mask option. It is similar to hashcat's new -a9 option (calculate a word list based on the target):
https://hashcat.net/forum/thread-9534-po...l#pid54596
BTW: Your command line is not correct, because -i expect a binary hccapx file as input while -c expect hc22000 files
You can pipe the calculated PSKs directly to hashcat or write them to a word list file (-o option), e.g:
That will calculate a list of known weak default PSKs (retrieved by analysis of wpa-sec results)
This will calculate PSKs based on the BSSID
This will calculate PSKs based on the ESSID and BSSID
This will calculate PSKs for NETGEARxx routers.
example using -o output (useful in combination with hashcat checkpoint request and --session --restore in case of big PSK files):
You can cascade all options (see --help for all options).
To increase hashcat speed (in case of big hc22000 files), I recommend to filter the hc22000 files by hcxhashtool (tailored to target) before calculating PSK lists.
That will keep the list small.
https://wpa-sec.stanev.org/
In contrast to RouterKeyGen, that calculate a single PSK
https://github.com/routerkeygen
it calculate a range of possible PSKs to feed hashcat with.
hcxpsktool is the missing tool between hashcat rule option and hashcat mask option. It is similar to hashcat's new -a9 option (calculate a word list based on the target):
https://hashcat.net/forum/thread-9534-po...l#pid54596
BTW: Your command line is not correct, because -i expect a binary hccapx file as input while -c expect hc22000 files
You can pipe the calculated PSKs directly to hashcat or write them to a word list file (-o option), e.g:
Code:
$ hcxpsktool --weakpass | hashcat -m 22000 test.hc22000
Code:
$ hcxpsktool --maconly -c test.hc22000 | hashcat -m 22000 test.hc22000
Code:
$ hcxpsktool -c test.hc22000 | hashcat -m 22000 test.hc22000
Code:
$ hcxpsktool --netgear | hashcat -m 22000 test.hc22000
example using -o output (useful in combination with hashcat checkpoint request and --session --restore in case of big PSK files):
Code:
$ hcxpsktool --netgear -o wordlist
$ hashcat -m 22000 test.hc22000 wordlist
You can cascade all options (see --help for all options).
To increase hashcat speed (in case of big hc22000 files), I recommend to filter the hc22000 files by hcxhashtool (tailored to target) before calculating PSK lists.
That will keep the list small.