hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
added a new git repository: https://github.com/ZerBea/hcxtoolsbleeding
This is a playground and testarea for new/upcomming versions of hcxtools - use with care!

wlandump-ng (3. generation)
- dropped libpcap dependency
- instead use raw sockets (much faster then libpcap)
   not all adapters support this(!)
   tested with this adapters: https://hashcat.net/forum/thread-6661-po...l#pid37592
- write complete radiotap header to capture file (for offline GPS correlation)
- use encryption type of ap on existing connections
- dropped Berkeley Packet Filter (makes no longer sense on random generated mac's by newer devices)
- instead use host blacklist (do not send deauthentications to this networks)
- stop attack if handhshake is retrieved
- only attack ap's / clients in range
- refactored authentication sequence to retrieve again all M2's(!)
- retrieve parameters from ap's in range (beacons no longer needed)

Typical commandline:
$ wlandump-ng -s -c 1 -t 15 -2 -i <interface> -o output.pcap
or use with blacklist:
$ wlandump-ng -s -c 1 -t 15 -2 -i <interface> -o output.pcap -B blacklist

see help (-h) for more options
Reply


Messages In This Thread
RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - by ZerBea - 11-21-2017, 01:53 PM
wlandump-ng vs hcxdumptool - by hulley - 02-10-2018, 10:26 PM