Skip to content

Commit 892b403

Browse files
author
=
committed
updated README.md
1 parent 99b384e commit 892b403

File tree

1 file changed

+9
-13
lines changed

1 file changed

+9
-13
lines changed

Diff for: README.md

+9-13
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,9 @@
11
hcxtools
22
==============
33

4-
Small set of tools convert packets from captures (h = hash, c = capture, convert and
5-
calculate candidates, x = different hashtypes) for the use with latest hashcat
6-
or John the Ripper.
4+
Small set of tools convert packets from captures (h = hash, c = capture, convert and calculate candidates, x = different hashtypes) for the use with latest hashcat or John the Ripper.
75
The tools are 100% compatible to hashcat and John the Ripper and recommended by hashcat.
6+
87
This branch is pretty closely synced to hashcat git and John the Ripper git.
98

109
Support of hashcat hash-modes: 4800, 5500, 2200x, 16100, 250x (deprecated), 1680x (deprecated)
@@ -13,20 +12,19 @@ Support of John the Ripper hash-modes: WPAPSK-PMK, PBKDF2-HMAC-SHA1, chap, netnt
1312

1413
Support of gzip (.gz) single file compression.
1514

16-
Main purpose is to detect weak points within own WiFi networks by analyzing the hashes.
17-
Therefore convert the dump file to WPA-PBKDF2-PMKID+EAPOL hash file and check if wlan-key or plainmasterkey was transmitted unencrypted.
18-
Or upload the "uncleaned" dump file (pcapng, pcap, cap) here https://wpa-sec.stanev.org/?submit
19-
to find out if your ap or the client is vulnerable by using common wordlists or a weak password generation algorithm.
15+
Unsupported: Windows OS, macOS, Android, emulators or wrappers!
2016

2117

2218
Brief description
2319
--------------
2420

25-
Multiple stand-alone binaries - designed to run on Arch Linux, but other Linux distributions should work, too.
26-
27-
All of these utilities are designed to execute only one specific function.
21+
You might expect me to recommend that everyone should be using hcxdumptool/hcxtools. But the fact of the matter is, however, that hcxdumptool/hcxtools is NOT recommended to be used by unexperienced users or newbees.
22+
If you are not familiar with Linux generally or if you do not have at least a basic level of knowledge as mentioned in section "Requirements", hcxdumptool/hcxtools is probably not what you are looking for.
23+
However, if you have that knowledge there’s no better toolkit than hcxdumtool/hcxtools.
2824

29-
hcxdumptool moved to: https://github.com/ZerBea/hcxdumptool
25+
Main purpose is to detect weak points within own WiFi networks by analyzing the hashes.
26+
Therefore convert the dump file to WPA-PBKDF2-PMKID+EAPOL hash file and check if wlan-key or plainmasterkey was transmitted unencrypted.
27+
Or upload the "uncleaned" dump file (pcapng, pcap, cap) here https://wpa-sec.stanev.org/?submit to find out if your ap or the client is vulnerable by using common wordlists or a weak password generation algorithm.
3028

3129
Read this post: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats (https://hashcat.net/forum/thread-6661.html)
3230

@@ -36,8 +34,6 @@ Read this post: Hash mode 22000 explained (https://hashcat.net/forum/thread-1025
3634

3735
Read this wiki: https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2
3836

39-
Unsupported: Windows OS, macOS, Android, emulators or wrappers!
40-
4137

4238
Detailed description
4339
--------------

0 commit comments

Comments
 (0)