Replies: 2 comments
-
Hello ZerBea: |
Beta Was this translation helpful? Give feedback.
-
Receiving e.g. a plain PreSharedKey on WiFi traffic is a rare case. But it is more common than you might think. There are several (MANAGEMENT and EAP frames) from which we get this information. On CLIENT side: On ACCESSPOINT side: ACCESSPOINTs are more static. Once everything is configured, they do their job more or less than expected. CLIENTs are more interesting, because they probe all entries of their wpa-supplicant.conf. Depending on the type of frame, hcxpcapngtool store the plain text received/requested by hcxdumptool to files:
This files can be used directly via hashcat/JtR or preprocessed by hcxeiutool in combination with hashcat/JtR and rules/masks. Compared to other common tools, hcxdumptool (hcxtools, too) is not focused on ACCESSPOINTs. Main target are EAPOL M2 frames, |
Beta Was this translation helpful? Give feedback.
-
👋 Welcome!
We’re using Discussions as a place to connect with other members of our community. We hope that you:
build together 💪.
To get started, comment below with an introduction of yourself and tell us about what you do with this community.
Beta Was this translation helpful? Give feedback.
All reactions