Finding information (if present in a BEACON) via Wireshark is simple:
Get example dump file (pmkid-not-recognized.cap) from here:
https://github.com/aircrack-ng/aircrack-...aster/test
Open it in Wireshark
Search for a BEACON
Open "IEEE 802.11 Wireless Management"
Open "Tag: Vendor Specific: Microsoft Corp.: WPS"
Open "Model Name:"
Or use hcxtools:
BTW: If you run hcxpcapngtool and if you wonder why the PMKID (packet 16789) has not been converted, take a look at packet 16792:
It is WPA3 - hascat can't do it.
Get example dump file (pmkid-not-recognized.cap) from here:
https://github.com/aircrack-ng/aircrack-...aster/test
Open it in Wireshark
Search for a BEACON
Open "IEEE 802.11 Wireless Management"
Open "Tag: Vendor Specific: Microsoft Corp.: WPS"
Open "Model Name:"
Code:
Model Name: RA69
Data Element Type: Model Name (0x1023)
Data Element Length: 4
Model Name: RA69
Or use hcxtools:
Code:
$ hcxpcapngtool -D devinfo pmkid-not-recognized.cap
$ cat devinfo
8cdef9d0b461 xiaomi RA69 12345 XiaoMiRouter 876543219abcdef012348cdef9d0b461 WML
BTW: If you run hcxpcapngtool and if you wonder why the PMKID (packet 16789) has not been converted, take a look at packet 16792:
Code:
Authentication Algorithm: Simultaneous Authentication of Equals (SAE) (3)