Handshake Hcxdumptool
#3
Two different things:

1) wpa-sec take pcapng/pcap/cap files only - and not to hashcat format converted hc22000 hashes
That is mentioned here:
https://wpa-sec.stanev.org/?submit

2) target NETWORK has to be specified using a Berkeley Packet Filter (BPF) in hcxdumptool (online during capturing)
If a BPF is not specified, hcxdumptool print a warning, because everything is attacked and captured:
Code:
BPF is unset! Make sure hcxdumptool is running in a 100% controlled environment!

Luckily you can filter the target NETWORK later on (off line)
convert pcapng file to hc.22000 file (by hcxpacpngtool)
filter target NETWORK by hcxhashtool or bash commands (see hashcat wiki: https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2)
convert filtered hc22000 file back to cap (hcxhash2cap)
upload cap to wpa-sec

Important notice:
Except dump files, all hcxtools append results to existing files!!!!
If you don't want this, clean your environment (output files) before you run hcxtools.
Reply


Messages In This Thread
Handshake Hcxdumptool - by brahim7 - 03-04-2024, 09:50 AM
RE: Handshake Hcxdumptool - by viktorx - 03-04-2024, 05:58 PM
RE: Handshake Hcxdumptool - by ZerBea - 03-05-2024, 10:06 AM
RE: Handshake Hcxdumptool - by brahim7 - 03-05-2024, 06:18 PM
RE: Handshake Hcxdumptool - by ZerBea - 03-05-2024, 08:43 PM