07-31-2024, 08:20 PM
(07-31-2024, 11:20 AM)ZerBea Wrote: Finding information (if present in a BEACON) via Wireshark is simple:
Get example dump file (pmkid-not-recognized.cap) from here:
https://github.com/aircrack-ng/aircrack-...aster/test
Open it in Wireshark
Search for a BEACON
Open "IEEE 802.11 Wireless Management"
Open "Tag: Vendor Specific: Microsoft Corp.: WPS"
Open "Model Name:"
Code:Model Name: RA69
Data Element Type: Model Name (0x1023)
Data Element Length: 4
Model Name: RA69
Or use hcxtools:
Code:$ hcxpcapngtool -D devinfo pmkid-not-recognized.cap
$ cat devinfo
8cdef9d0b461 xiaomi RA69 12345 XiaoMiRouter 876543219abcdef012348cdef9d0b461 WML
BTW: If you run hcxpcapngtool and if you wonder why the PMKID (packet 16789) has not been converted, take a look at packet 16792:
It is WPA3 - hascat can't do it.Code:Authentication Algorithm: Simultaneous Authentication of Equals (SAE) (3)
thanks for the the detail explanaition .I realliy appriciate it .
the reason I left it run for half an hour is I thought more information is better and also for the first 3 tries I couldn't capture the handshake for some reason even after sevral minutes of monitoring .
and I'm just following tutorials on youtube I have no idea on what I'm doing .
so there is no hope finding the password ?