03-20-2013, 05:02 PM (This post was last modified: 03-21-2013, 02:36 PM by atom.)
Hello all.
Until now I have only tested WPA hashes, and they have been extracted from a airodump-ng's capture file using tshark or aircrack-ng (-J option).
I wanna go one step beyond, and in an effort to undestand and learning a bit of the inners of hash file extraction, I wanna strip (if possible) a real hash from a .cap WireShark's capture file.
I have captured those types of authentication:
- VNC (RealVNC).
- SSH2 (OpenSSH).
- SMB (connection to SAMBA server).
so I would like to know the way of obtaining a single hash from any of those .cap files.
Is there any automation for this task? Or can I copy&paste directly any data from some of the captured package/s?
I have tested EtterCap, TShark and Cain&Abel with no results. None of them seems to give a valid hash string.
Any ideas or URL to check for? I can post .cap files or some of their data if needed.
Thanks you a lot.
Until now I have only tested WPA hashes, and they have been extracted from a airodump-ng's capture file using tshark or aircrack-ng (-J option).
I wanna go one step beyond, and in an effort to undestand and learning a bit of the inners of hash file extraction, I wanna strip (if possible) a real hash from a .cap WireShark's capture file.
I have captured those types of authentication:
- VNC (RealVNC).
- SSH2 (OpenSSH).
- SMB (connection to SAMBA server).
so I would like to know the way of obtaining a single hash from any of those .cap files.
Is there any automation for this task? Or can I copy&paste directly any data from some of the captured package/s?
I have tested EtterCap, TShark and Cain&Abel with no results. None of them seems to give a valid hash string.
Any ideas or URL to check for? I can post .cap files or some of their data if needed.
Thanks you a lot.
Crack Wpa2 Fast
A WiFi-Penetest-Cracking tool for WPA/WPA2 (Handshake, PMKID, Offline Cracking, EAPOLS, Deauthentication Attack). WiFiBroot is built to provide clients all-in-one facility for cracking WiFi (WPA/WPA2) networks. It heavily depends on scapy, a well-featured packet manipulation library in Python.Almost every process within is dependent somehow on scapy layers and other functions. With the help a these commands you will be able to hack WiFi AP (access points) that use WPA/WPA2-PSK (pre-shared key) encryption. The basis of this method of hacking WiFi lies in capturing of the WPA/WPA2 authentication handshake and then cracking the PSK using.
Hi, I have have a question about decrypting PSK. I understand how this is done using ssid and passphrase and also using the PMK. Is there anyway to decrypt traffic by capturing the EAPOL exchange, manually calculating the PMK and then manually calculating the PTK? Is there a way to feed the PTK directly int wireshark instead of wireshark calculating the PTK behind the scenes. I'm working on a 802.11i like procotol and the standard decryption method will not work, and I do not have the time to try and modify the source.
Using Wireshark To Hack Wifi
editretagflag offensiveclosemergedelete