skipping file: (null) (invalid eapol size)
#9
That are good news. Thanks for the feedback.
Now start to capture (over a long time) and collect hcxpcaptool -E -I -U lists and -o -k hashfiles. At regular intervals run your hashes against this lists and
https://wpa-sec.stanev.org/dict/cracked.txt.gz
https://wpa-sec.stanev.org/dict/rkg.txt.gz
Alternative you can use wlancap2wpasec to upload your pcapng (cap/pcap) files to
https://wpa-sec.stanev.org/?nets
In that case they will be checked against this wordlists:
https://wpa-sec.stanev.org/?dicts
To reduce bandwith you can compress them using gzip:
1408032 test.pcapng
$ gzip test.pcapng
205437 test.pcapng.gz

Wireshark, tshark, hcxpcaptool will understand this.
For example this will show you the content of the pcapng file
$ tshark -r test.pcapng.gz

and that one all AP-LESS attacks:
$ tshark -r test.pcapng.gz -Y frame.comment -T fields -E header=y -e frame.number -e frame.time -e wlan.sa -e frame.comment

read more about this filters here:
https://www.wireshark.org/docs/dfref/f/frame.html

hcxdumptool and hcxpcaptool are 100% compatible to wireshark familiy.
Reply


Messages In This Thread
RE: skipping file: (null) (invalid eapol size) - by ZerBea - 08-31-2019, 11:14 PM