

This repository cloned with all submodules ( -recursive flag in git clone or git submodules update command run) Hashcat or JtR: get PSK from hash Get sourceĪrch Linux pacman -S hcxtools Arch Linux ARMĪrch Linux ARM pacman -S hcxtools Black Archīlack Arch is an Arch Linux-based penetration testing distribution for penetration testers and security researchersĪndroid NDK installed in your system and in path variable Hcxeiutool: calculate wordlists from ESSID Hcxdumptool: attack and capture everything (depending on options) Hcxdumptool -> hcxpcapngtool -> hcxhashtool (additional hcxpsktool/hcxeiutool) -> hashcat or JtR Tool to run several tests to determine if ACCESS POINTs or CLIENTs are vulnerable Unsupported: Windows OS, macOS, Android, emulators or wrappers and NETLINK! Detailed description Tool Read this post: Hash mode 22000 explained ( ) Read this post: New attack on WPA/WPA2 using PMKID ( ) Read this post: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats ( ) Stand-alone binaries - designed to run on Arch Linux, but other Linux distributions should work, too.Ĭapture format pcapng is compatible to Wireshark and tshark. To reduce dump file size, gzip (.gz) compression is supported.Ĭonvert the pcapng file to WPA-PBKDF2-PMKID+EAPOL hashline (22000) with hcxpcapngtool (hcxtools)Īnd check if PreSharedKey or PlainMasterKey was transmitted unencrypted. To see if your ACCESS POINT or the CLIENT is vulnerable by using common wordlists. Small tool to capture packets from wlan devices and detect weak point within own WiFi networks.Īfter capturing, upload the "uncleaned" pcapng file here
