hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Here is my experiencce on 10'000 cap files, command line was :
Code:
hcxpcaptool -M imsilist -X clientprobelist -I wordlist -E wordlist  -T trafficlist -g gpslist -U usernamelist -P pmklist --netntlm-out=netntlm --md5-out=md5chap --tacacsplus-out=tacacs --nonce-error-corrections=128 --time-error-corrections=10000  -z pmkid -o hccapx file.cap
(any advice on these arguments would of course be very appreciated!)

Results:
-M: gave 2 results (on 10000). What's inside : 15 digits (IMSI). Would that mean that the access point was a smartphone? Not useful for hashcat goal but for forensic maybe.
-X: 5000 results. Don't really think the content (mac address:essid) can help to crack password.
-I and -E : lots of results, as explained before, wordlist of ESSIDs and other things. Not convinced (yest!) if that can help to crack password.
-T: network information, not really useful for hashcat goal.
-g : only 1 result, gives the gps coordinates. not useful for hashcat be can be for other purpose (forensic)
-U: few results, but in my opinion not really useful for hashcat goal.
-P: few results, don't know what to do with that.
--netntlm-out: 0 result (on 10000 files). Don't know why.
--md5chap : same.
--tacacs: same.

Note: only 20% were captured with hcxdumptool, that can explain the results ?
Anyway, thanks again for this great tool !
Reply


Messages In This Thread
wlandump-ng vs hcxdumptool - by hulley - 02-10-2018, 10:26 PM
RE: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats - by Mem5 - 06-08-2019, 01:32 PM