10-06-2017, 11:54 AM
shortly before final release of hcxtools 4.0.0 I decided to add a new tool: wlanhcx2psk
wlanhcx2psk calculates weak password candidates for hashcat based on opensource intelligence data found in the hccapx file. There are no reverse engineered or vendor specific algorithms inside.
Usage is very simple:
The slow way:
$ wlanhcx2psk -s -i hashfile.hccapx | hashcat -m 2500 hashfile.hccapx
The fast way:
$ wlanhcx2psk -o candidates -i hashfile.hccapx
$ sort candidates | uniq > candidates.srt
$ hashcat -m 2500 hashfile.hccapx candidates.srt
wlanhcx2psk calculates weak password candidates for hashcat based on opensource intelligence data found in the hccapx file. There are no reverse engineered or vendor specific algorithms inside.
Usage is very simple:
The slow way:
$ wlanhcx2psk -s -i hashfile.hccapx | hashcat -m 2500 hashfile.hccapx
The fast way:
$ wlanhcx2psk -o candidates -i hashfile.hccapx
$ sort candidates | uniq > candidates.srt
$ hashcat -m 2500 hashfile.hccapx candidates.srt