understanding wpa hashes
#2
Basic stuff/knowledge:
PMKID attack is described here
https://hashcat.net/forum/thread-7717.html

4way handshake is described here
https://www.wifi-professionals.com/2019/...-handshake

Open your dump file, by Wireshark and set eapol filter. Now you can see the 4way handhakes, if present in your dump file.

Use hcxpcapngtool to convert the hashes for use with hashcat:
$ hcxdumptool -o hash.22000 your_dumpfile

Than run hashcat:
$ hashcat -m 22000 hash.22000 your_wordlist
and take a look at the status output.

BTW:
hccapx is an old binary format and you shouldn't use it any longer.
Hash mode 22000 is supported by bettercap. pwnagotchi is based on bettercap, so this mode will work, too.
Reply


Messages In This Thread
understanding wpa hashes - by skypickle - 06-18-2021, 04:59 AM
RE: understanding wpa hashes - by ZerBea - 06-18-2021, 11:47 PM