hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Latest git head is able to detect EAP-TLS (tunneled TLSv1.2)- WAP3/SAE - SAE SHA384 SUITE B frames with 24 byte MIC (WPA3 ENTERPRISE).

example pcapng in Wireshark default capture format (gzip compressed):
https://github.com/wireshark/wireshark/b....pcapng.gz

Code:
$ hcxpcapngtool wpa3-suiteb-192.pcapng.gz
decompressing wpa3-suiteb-192.pcapng.gz to /tmp/wpa3-suiteb-192.pcapng.gz.tmp
reading from wpa3-suiteb-192.pcapng.gz.tmp...

summary capture file
file name.................................: wpa3-suiteb-192.pcapng.gz
version (pcapng).........................: 1.0
operating system.........................: N/A
application..............................: N/A
interface name...........................: N/A
interface vendor.........................: 000000
weak candidate...........................: N/A
MAC ACCESS POINT.........................: 000000000000 (incremented on every new client)
MAC CLIENT...............................: 000000000000
REPLAYCOUNT..............................: 0
ANONCE...................................: 0000000000000000000000000000000000000000000000000000000000000000
SNONCE...................................: 0000000000000000000000000000000000000000000000000000000000000000
timestamp minimum (GMT)..................: 29.10.2019 08:35:04
timestamp maximum (GMT)..................: 29.10.2019 08:35:04
link layer header type...................: DLT_IEEE802_11_RADIO (127)
endianess (capture system)...............: little endian
packets inside...........................: 97
BEACON (total)...........................: 2
PROBEREQUEST.............................: 2
PROBERESONSE.............................: 1
AUTHENTICATION (OPEN SYSTEM).............: 6
ASSOCIATIONREQUEST (total)...............: 3
ASSOCIATIONREQUEST (SAE SHA384 SUITE B)..: 3
IDENTITIES...............................: 1
EAP (total)..............................: 15
EAP CODE REQUEST.........................: 7
EAP CODE RESPONSE........................: 7
EAP ID...................................: 2
EAP-TLS messages.........................: 10
EAPOL messages (total)...................: 12
EAPOL RSN messages.......................: 12
ESSID (total unique).....................: 1
EAPOL M1 messages........................: 3
EAPOL M2 messages........................: 3
EAPOL M3 messages........................: 3
EAPOL M4 messages........................: 3
Reply


Messages In This Thread
wlandump-ng vs hcxdumptool - by hulley - 02-10-2018, 10:26 PM
RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - by ZerBea - 01-28-2020, 06:43 PM