You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: README.md
+17-12
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,14 @@ hcxtools
4
4
Small set of tools convert packets from captures (h = hash, c = capture, convert and calculate candidates, x = different hashtypes) for the use with latest hashcat or John the Ripper.
5
5
The tools are 100% compatible to hashcat and John the Ripper and recommended by hashcat.
6
6
7
+
8
+
Brief description
9
+
--------------
10
+
11
+
Main purpose is to detect weak points within own WiFi networks by analyzing the hashes.
12
+
Therefore convert the dump file to WPA-PBKDF2-PMKID+EAPOL hash file and check if wlan-key or plainmasterkey was transmitted unencrypted.
13
+
Or upload the "uncleaned" dump file (pcapng, pcap, cap) here https://wpa-sec.stanev.org/?submit to find out if your ap or the client is vulnerable by using common wordlists or a weak password generation algorithm.
14
+
7
15
This branch is pretty closely synced to hashcat git and John the Ripper git.
8
16
9
17
Support of hashcat hash-modes: 4800, 5500, 2200x, 16100, 250x (deprecated), 1680x (deprecated)
@@ -14,18 +22,6 @@ Support of gzip (.gz) single file compression.
14
22
15
23
Unsupported: Windows OS, macOS, Android, emulators or wrappers!
16
24
17
-
18
-
Brief description
19
-
--------------
20
-
21
-
You might expect me to recommend that everyone should be using hcxdumptool/hcxtools. But the fact of the matter is, however, that hcxdumptool/hcxtools is NOT recommended to be used by unexperienced users or newbees.
22
-
If you are not familiar with Linux generally or if you do not have at least a basic level of knowledge as mentioned in section "Requirements", hcxdumptool/hcxtools is probably not what you are looking for.
23
-
However, if you have that knowledge there’s no better toolkit than hcxdumtool/hcxtools.
24
-
25
-
Main purpose is to detect weak points within own WiFi networks by analyzing the hashes.
26
-
Therefore convert the dump file to WPA-PBKDF2-PMKID+EAPOL hash file and check if wlan-key or plainmasterkey was transmitted unencrypted.
27
-
Or upload the "uncleaned" dump file (pcapng, pcap, cap) here https://wpa-sec.stanev.org/?submit to find out if your ap or the client is vulnerable by using common wordlists or a weak password generation algorithm.
28
-
29
25
Read this post: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats (https://hashcat.net/forum/thread-6661.html)
30
26
31
27
Read this post: New attack on WPA/WPA2 using PMKID (https://hashcat.net/forum/thread-7717.html)
@@ -199,3 +195,12 @@ Important notice:
199
195
tools do not do NONCE ERROR CORRECTIONS
200
196
in case of a packet loss, you get a wrong PTK
201
197
198
+
199
+
Warning:
200
+
--------------
201
+
202
+
You might expect me to recommend that everyone should be using hcxdumptool/hcxtools. But the fact of the matter is, however, that hcxdumptool/hcxtools is NOT recommended to be used by unexperienced users or newbees.
203
+
If you are not familiar with Linux generally or if you do not have at least a basic level of knowledge as mentioned in section "Requirements", hcxdumptool/hcxtools is probably not what you are looking for.
204
+
However, if you have that knowledge there’s no better toolkit than hcxdumtool/hcxtools.
205
+
206
+
The entire toolkit (hcxdumptool and hcxtools) is designed to be an analysis toolkit.
0 commit comments