You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+9-13
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,9 @@
1
1
hcxtools
2
2
==============
3
3
4
-
Small set of tools convert packets from captures (h = hash, c = capture, convert and
5
-
calculate candidates, x = different hashtypes) for the use with latest hashcat
6
-
or John the Ripper.
4
+
Small set of tools convert packets from captures (h = hash, c = capture, convert and calculate candidates, x = different hashtypes) for the use with latest hashcat or John the Ripper.
7
5
The tools are 100% compatible to hashcat and John the Ripper and recommended by hashcat.
6
+
8
7
This branch is pretty closely synced to hashcat git and John the Ripper git.
9
8
10
9
Support of hashcat hash-modes: 4800, 5500, 2200x, 16100, 250x (deprecated), 1680x (deprecated)
@@ -13,20 +12,19 @@ Support of John the Ripper hash-modes: WPAPSK-PMK, PBKDF2-HMAC-SHA1, chap, netnt
13
12
14
13
Support of gzip (.gz) single file compression.
15
14
16
-
Main purpose is to detect weak points within own WiFi networks by analyzing the hashes.
17
-
Therefore convert the dump file to WPA-PBKDF2-PMKID+EAPOL hash file and check if wlan-key or plainmasterkey was transmitted unencrypted.
18
-
Or upload the "uncleaned" dump file (pcapng, pcap, cap) here https://wpa-sec.stanev.org/?submit
19
-
to find out if your ap or the client is vulnerable by using common wordlists or a weak password generation algorithm.
15
+
Unsupported: Windows OS, macOS, Android, emulators or wrappers!
20
16
21
17
22
18
Brief description
23
19
--------------
24
20
25
-
Multiple stand-alone binaries - designed to run on Arch Linux, but other Linux distributions should work, too.
26
-
27
-
All of these utilities are designed to execute only one specific function.
21
+
You might expect me to recommend that everyone should be using hcxdumptool/hcxtools. But the fact of the matter is, however, that hcxdumptool/hcxtools is NOT recommended to be used by unexperienced users or newbees.
22
+
If you are not familiar with Linux generally or if you do not have at least a basic level of knowledge as mentioned in section "Requirements", hcxdumptool/hcxtools is probably not what you are looking for.
23
+
However, if you have that knowledge there’s no better toolkit than hcxdumtool/hcxtools.
28
24
29
-
hcxdumptool moved to: https://github.com/ZerBea/hcxdumptool
25
+
Main purpose is to detect weak points within own WiFi networks by analyzing the hashes.
26
+
Therefore convert the dump file to WPA-PBKDF2-PMKID+EAPOL hash file and check if wlan-key or plainmasterkey was transmitted unencrypted.
27
+
Or upload the "uncleaned" dump file (pcapng, pcap, cap) here https://wpa-sec.stanev.org/?submit to find out if your ap or the client is vulnerable by using common wordlists or a weak password generation algorithm.
30
28
31
29
Read this post: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats (https://hashcat.net/forum/thread-6661.html)
0 commit comments