Hi hulley.
Now you can see hcxtools in action, twice:
1)
wpa-sec moved to hashcat >= 4.0.1 and hcxtools >= 4.0.1
The python client (help_crack.py) is updated to version (0.9.0 / 10 Feb 2018)
BTW: you can help retrieving new PSKs, contributing GPU power (simple run the python client)
if you add the following line to help_crack.py (line 405):
os.system('cat help_crack.net >> wpasec_new.hccapx')
you will get a local copy of every network hashcat is working on.
2) somebody made a video of "Automated Wifi Attacks With HCXTOOLS"
https://www.youtube.com/watch?v=3-IhrlBpoQg
Now you can see hcxtools in action, twice:
1)
wpa-sec moved to hashcat >= 4.0.1 and hcxtools >= 4.0.1
The python client (help_crack.py) is updated to version (0.9.0 / 10 Feb 2018)
BTW: you can help retrieving new PSKs, contributing GPU power (simple run the python client)
if you add the following line to help_crack.py (line 405):
os.system('cat help_crack.net >> wpasec_new.hccapx')
you will get a local copy of every network hashcat is working on.
2) somebody made a video of "Automated Wifi Attacks With HCXTOOLS"
https://www.youtube.com/watch?v=3-IhrlBpoQg