11-15-2022, 08:07 PM
Hello, sorry for the newbie question but im looking to buy a laptop with a RTL8723BE 802.11 bgn wifi adapter. How can i know if hcxdumptool will work with its drivers?
hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
|
11-15-2022, 08:07 PM
Hello, sorry for the newbie question but im looking to buy a laptop with a RTL8723BE 802.11 bgn wifi adapter. How can i know if hcxdumptool will work with its drivers?
From README.md section Adapter: https://github.com/ZerBea/hcxdumptool
"Not recommended WiFi chipsets (Broadcom, Intel, Realtek and Atheros), especially" RTL8723BE == Realtek chipset.
Hey,
I really love your tools and had some great success with it. You really set a new standard for wifi-sec auditing! But I can't really figure out, how to run the server / client stuff with hcxdumptool. My current setup is a netbook with 4 wifi ifaces. Tried different approaches until I discovered the the server / client mode. My wrapper / script looks like this Code: # Kill NetworkMangler / wpa_supplicant I left the --ip blank, works too I'm assuming I don't need the -o ${CAPDIR}/$iface0.pcapng whith the clients since there will be only one cap, right? Do I even need any enable_status other than 256 for the clients? The logging would be redundant too, right? Tinkered so much I seem to be stuck in a rut. Can you point me in a general direction where I can read more about server / client? Thanks!
11-17-2022, 01:43 PM
I suggest to do some tests running two terminals (attached screenshot).
It is important to start the CLIENT first Code: Terminal one -> hcxdumdptool in servermode Now play around with the status options until everything is shown as expected. Please notice: If the server - clients session is slow or timed out you run into a pselect() error which result in a heavy packet loss on the server. I do not recommend to use WiFi (overlapped channels) or bluetooth.
11-17-2022, 01:51 PM
Awesome, thanks!
Will test it today
11-25-2022, 12:10 AM
I figured I'd post a feature request here.... I've been trying to figure out where to focus my efforts with those ZyXEL modems and managed to get access to a database with multiple caps. Now ZyXEL actually uses zyxel, Zyxel, ZyXEL and ZYXEL as ESSIDS. Would be possible to change the --essid-part option to case insensitive to catch all of these at once? Right now, I had to run hcxhashtool multiple times to get the four different case options for this particular vendor.
11-25-2022, 09:37 AM
@drsnooker
Interesting feature request which will be a nice improvement. Let me think awhile how to add this. I guess I'll add a new option. After testing it against wpa-sec database I'll push the update (within they next few days). BTW: hcxdumptool (weak candidates in combination with hcxpcapng -R option) discovered some new kind of default PSKs: ZYXEL-?d?d?d:?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d and ZyXEL_KEENETIC_LITE_?H?H?H?H?H?H:zyxel-?d?d?d?d?d?d-cbd I have the firmware for the first one, but I have no time to dive into it and to add this to hcxpsktool. At the moment I'm working on all tools to move to the new EVP API (OpenSSL 3.0). The code changes are huge.
11-25-2022, 10:17 AM
That was less work than expected.
By latest commit: https://github.com/ZerBea/hcxtools/commi...a191aacaf7 this feature is added. Code: --essid-part=<part of ESSID> : filter by part of ESSID (case sensitive) Thanks for your effort. You're doing a great work. Please let me know if you need more options.
Another one, discovered during this hcxhashtool tests on wpa-sec:
ZyXEL_KEENETIC_LITE:zyxel-?d?d?d-?l?l?l I'm sure, running your feature request we get some more. |
« Next Oldest | Next Newest »
|