Skip to content

Commit 6457ef2

Browse files
author
=
committed
updated information
1 parent 892b403 commit 6457ef2

File tree

1 file changed

+17
-12
lines changed

1 file changed

+17
-12
lines changed

README.md

+17-12
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,14 @@ hcxtools
44
Small set of tools convert packets from captures (h = hash, c = capture, convert and calculate candidates, x = different hashtypes) for the use with latest hashcat or John the Ripper.
55
The tools are 100% compatible to hashcat and John the Ripper and recommended by hashcat.
66

7+
8+
Brief description
9+
--------------
10+
11+
Main purpose is to detect weak points within own WiFi networks by analyzing the hashes.
12+
Therefore convert the dump file to WPA-PBKDF2-PMKID+EAPOL hash file and check if wlan-key or plainmasterkey was transmitted unencrypted.
13+
Or upload the "uncleaned" dump file (pcapng, pcap, cap) here https://wpa-sec.stanev.org/?submit to find out if your ap or the client is vulnerable by using common wordlists or a weak password generation algorithm.
14+
715
This branch is pretty closely synced to hashcat git and John the Ripper git.
816

917
Support of hashcat hash-modes: 4800, 5500, 2200x, 16100, 250x (deprecated), 1680x (deprecated)
@@ -14,18 +22,6 @@ Support of gzip (.gz) single file compression.
1422

1523
Unsupported: Windows OS, macOS, Android, emulators or wrappers!
1624

17-
18-
Brief description
19-
--------------
20-
21-
You might expect me to recommend that everyone should be using hcxdumptool/hcxtools. But the fact of the matter is, however, that hcxdumptool/hcxtools is NOT recommended to be used by unexperienced users or newbees.
22-
If you are not familiar with Linux generally or if you do not have at least a basic level of knowledge as mentioned in section "Requirements", hcxdumptool/hcxtools is probably not what you are looking for.
23-
However, if you have that knowledge there’s no better toolkit than hcxdumtool/hcxtools.
24-
25-
Main purpose is to detect weak points within own WiFi networks by analyzing the hashes.
26-
Therefore convert the dump file to WPA-PBKDF2-PMKID+EAPOL hash file and check if wlan-key or plainmasterkey was transmitted unencrypted.
27-
Or upload the "uncleaned" dump file (pcapng, pcap, cap) here https://wpa-sec.stanev.org/?submit to find out if your ap or the client is vulnerable by using common wordlists or a weak password generation algorithm.
28-
2925
Read this post: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats (https://hashcat.net/forum/thread-6661.html)
3026

3127
Read this post: New attack on WPA/WPA2 using PMKID (https://hashcat.net/forum/thread-7717.html)
@@ -199,3 +195,12 @@ Important notice:
199195
tools do not do NONCE ERROR CORRECTIONS
200196
in case of a packet loss, you get a wrong PTK
201197

198+
199+
Warning:
200+
--------------
201+
202+
You might expect me to recommend that everyone should be using hcxdumptool/hcxtools. But the fact of the matter is, however, that hcxdumptool/hcxtools is NOT recommended to be used by unexperienced users or newbees.
203+
If you are not familiar with Linux generally or if you do not have at least a basic level of knowledge as mentioned in section "Requirements", hcxdumptool/hcxtools is probably not what you are looking for.
204+
However, if you have that knowledge there’s no better toolkit than hcxdumtool/hcxtools.
205+
206+
The entire toolkit (hcxdumptool and hcxtools) is designed to be an analysis toolkit.

0 commit comments

Comments
 (0)