Replies: 1 comment
-
Thank you very for your time |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
This discussion describes how to get firm with hcxdumptool/hcxlabtool and hcxtools.
For this, a development environment must be defined. Otherwise you learn nothing!
The entire work flow (setup test target, command line options and expected results) is described below (for hashcat and for JtR)!
step 1
Make sure you're running a recommended Linux kernel as mentioned in README.md section requirements.
Also make sure that your distribution is up to date and well configured (this is addressed to Kali users)!
step 2
get information about the running services:
These are my running services. Your services list may look different.
step 3
identify the services that take ACCESS to the WiFi interface:
step 4
stop this services:
step 5
configure your test target ACCESS POINT
step 6
get information about your WiFi device
step 7
run hcxdumptool rcascan to get information about your target
Test target: AP_7272
Operating channel 8a
received PROBERESPONSES 24 == target is in range and it responds to hcxdumptool.
step 8
compile attack BPF:
$ hcxdumptool --bpfc="wlan addr3 ccce1edc3bee or wlan addr3 ffffffffffff" > attack.bpf
the compiled BPF should look similar to this:
step 9
connect a CLIENT to your target AP (you don't need this if the AP uses PMKID caching)
step 10
run the attack
$ sudo hcxdumptool -i wlp48s0f4u2u3 -w test.pcapng -c 8a --bpf=attack.bpf --rds=1
the status should shwo something like this:
CHA LAST R 1 3 P S MAC-AP ESSID (last EAPOL on top) SCAN-FREQUENCY: 2447
8 10:30:05 + + + + ccce1edc3bee AP_7272
a "+" in column R == target is an range
a "+" in column 1 == we got an EAPOL M1 from the target, but the target doesn't use PMKIDs (empty column P)
a "+" in column S == AP uses a by hashcat or JtR supported hash mode
a "+" in column 3 == we got an authorized handshake (either M1M2M3 or M1M2M3M4) hashcat or JtR can work on
LAST E 2 MAC-AP-ROGUE MAC-CLIENT ESSID (last M2ROGUE on top)
10:29:58 ccce1edc3bee 74da38f2038e AP_7272
the CLIENT 74da38f2038e is authenticated to the target AP
no "+" plus in column 2 == the CLIENT is not connected to hcxdumptool (because our test BPF prevent this"
step 11 (for hashcat)
convert the dump file to hc22000
the converted hash should look like this:
step 12 (for hashcat)
run hashcat to recover the PSK
step 11 (for JtR)
convert the dump file to JtR
the converted hash should look like this:
step 12 (for JtR)
recover the psk
Beta Was this translation helpful? Give feedback.
All reactions