Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Run PMKID Attack without hashcat crack #173

Closed
More2Chi opened this issue Nov 11, 2018 · 4 comments
Closed

Run PMKID Attack without hashcat crack #173

More2Chi opened this issue Nov 11, 2018 · 4 comments

Comments

@More2Chi
Copy link

More2Chi commented Nov 11, 2018

how do I run a PMKID Attack without hashcat? example usage: run PMKID Attack on Nethunter with wifite/wifite 2 and save file instead of cracking.. i tried running (sudo priv) wifite.py -mac --pmkid to force with the same result (skips attack cause hashcat is "missing")

FYI - i read the other posts and they didn't answer what to actually do or fix

@RaduNico
Copy link

RaduNico commented Nov 11, 2018

Hello!

This change is not currently in the Wifite master branch, however PR #159 comes to fix this.

A workaround suggested in #149 is doing alias hashcat=/bin/false. Anything that makes hashcat a valid command to run from the terminal will probably work.

@More2Chi
Copy link
Author

So i tried entering " alias hashcat=/bin/false " into the terminal then running wifite, But its still skipping PMKID because hashcat is missing.

Any tips?

@RaduNico
Copy link

RaduNico commented Nov 13, 2018

Try adding the following lines to your ~/.bashrc file:

alias sudo='sudo '
alias hashcat='/bin/false'

You can add those lines anywhere, preferably to the end of the file. Just make sure you do not add them inside an if. After you do this you need to open a new shell to 'refresh' the settings. If you ever install hashcat don't forget to remove those lines!

If this does not work then create a small script using your favorite text editor in /sbin/hashcat that contains:

#!/bin/bash

/bin/false

Don't forget to run 'chmod +x /sbin/hashcat'. Because sbin is owned by root you will need to do the above commands using sudo.

@More2Chi
Copy link
Author

Thanks! I got it working via the 2nd method, Added hashcat containing the bash script to /sbin/ and made it executable.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants