iot device transmits plaintext wifi password & essid
#3
Detect a weak point - precisely for this purpose the tools (hcxdumptool, hcxlabtool series and hcxtools) were developed.
Regardless of whether the target is an ACCESS POINT or a CLIENT (regardless of whether they are connected to each other or not), hcxdumptool /hcxlabtool series) retrieves all available information from it and hcxpcapngtool convert this information to a format accepted by hashcat or JtR.
More information is here:
https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2
Information about the PMKID attack vector is here:
https://hashcat.net/forum/thread-7717.html

a nice example is here:
https://github.com/evilsocket/pwnagotchi...-598597214

In addition to that RKG (https://github.com/routerkeygen) and hcxpsktool calculate some more (default) weak passwords which are based directly on the target.
Both tools are based on deep analysis of wpa-sec (https://wpa-sec.stanev.org) submissions.

The entire development history (start from the point when Atom persuaded me to go open source, like hashcat) is here:
https://hashcat.net/forum/thread-6661.html

BTW:
I fully agree, tshark and Wireshark should be the first choice to analyze dumped unfiltered(!) traffic.
Reply


Messages In This Thread
RE: iot device transmits plaintext wifi password & essid - by ZerBea - 08-02-2022, 07:54 AM