06-18-2021, 11:47 PM
Basic stuff/knowledge:
PMKID attack is described here
https://hashcat.net/forum/thread-7717.html
4way handshake is described here
https://www.wifi-professionals.com/2019/...-handshake
Open your dump file, by Wireshark and set eapol filter. Now you can see the 4way handhakes, if present in your dump file.
Use hcxpcapngtool to convert the hashes for use with hashcat:
$ hcxdumptool -o hash.22000 your_dumpfile
Than run hashcat:
$ hashcat -m 22000 hash.22000 your_wordlist
and take a look at the status output.
BTW:
hccapx is an old binary format and you shouldn't use it any longer.
Hash mode 22000 is supported by bettercap. pwnagotchi is based on bettercap, so this mode will work, too.
PMKID attack is described here
https://hashcat.net/forum/thread-7717.html
4way handshake is described here
https://www.wifi-professionals.com/2019/...-handshake
Open your dump file, by Wireshark and set eapol filter. Now you can see the 4way handhakes, if present in your dump file.
Use hcxpcapngtool to convert the hashes for use with hashcat:
$ hcxdumptool -o hash.22000 your_dumpfile
Than run hashcat:
$ hashcat -m 22000 hash.22000 your_wordlist
and take a look at the status output.
BTW:
hccapx is an old binary format and you shouldn't use it any longer.
Hash mode 22000 is supported by bettercap. pwnagotchi is based on bettercap, so this mode will work, too.