Replies: 58 comments
-
The old status function is very CPU cycle intensive. It show status when an event occurs. Compared to the old WIRELESS EXTENSION version, the NL80211 version is trimmed for effectiveness and speed. But I leave this request open. Active RCASCAN is still missing, too as well as requesting EAP-IDs. I have to add this before the next release. BTW:
To simplify it, you can add this commands to a bash script, e.g.: showeapol
|
Beta Was this translation helpful? Give feedback.
-
By last commit I added a new option:
on rds=1 last last last AP of which a PMKID/EAPOL M1M2M3 was received is on top |
Beta Was this translation helpful? Give feedback.
-
thanks and now you've explained why it makes sense |
Beta Was this translation helpful? Give feedback.
-
Compared to the old WIRELESS EXTENSION version, NL80211 version is a thousand times more effective. |
Beta Was this translation helpful? Give feedback.
-
where can I contact you ZerBea? |
Beta Was this translation helpful? Give feedback.
-
You can get my email address via git API: |
Beta Was this translation helpful? Give feedback.
-
wow, I didnt know that API, thanks! |
Beta Was this translation helpful? Give feedback.
-
can someone share an Android version of this tool for capturing PMKID to file |
Beta Was this translation helpful? Give feedback.
-
hcxdumptool should run fine on Android: Unfortunately I don't have an Android environment to compile it. Maybe some Android users can help. |
Beta Was this translation helpful? Give feedback.
-
Ok. thanks. |
Beta Was this translation helpful? Give feedback.
-
With the introduction of 6.3.0 I can't seem to get it to run in the background with '&' at the end of the command line. Or maybe it is running, but It does disappear from htop. Thus I assume its not running.... But I could be wrong. |
Beta Was this translation helpful? Give feedback.
-
I'll check it. Could be related to the new real time display. |
Beta Was this translation helpful? Give feedback.
-
Ok, tested it. Terminal 2:
Doing exactly what expected. Terminating in terminal 2:
Terminal 1 ctrl+c:
And now the funny part: According to this: |
Beta Was this translation helpful? Give feedback.
-
Awwwww I have a lot to learn....yea what confused me is the fact you can see the process in top until you close the session..... I'll give it another few runs. I just checked out the timestamps in the .pcapng and it does seem to still be running. I guess I was just after something visual to ensure it was up. |
Beta Was this translation helpful? Give feedback.
-
Wait wait....im still not having much luck here. Maybe I am not understanding it properly. It is my understanding that I should be able to close 'Terminal 1' and the process will continue to run in the background. I am still not seeing that behaviour. As soon as I close terminal 1 (Simulating putting my laptop away) the process seems to stop. (I confirm this by running the 'ps -All | grep hcxdumptool' command again which shows no process running. Apologies if this does not make sense. Love your work by the way! its incredible! |
Beta Was this translation helpful? Give feedback.
-
Is the target MAC in addr1, addr2 and addr3 of the filter? BTW: |
Beta Was this translation helpful? Give feedback.
-
The tcpdump command I'm launching was this:
That part I think is ok because the file is well generated and contains the right content. after some testing trial and error... I decided to generate traffic to the AP just authenticating a real user to the PMKID vulnerable AP and something was shown, but I think that doesn't mean a PMKID was captured yet I need to do more tests because my first thoughts about this is that it is not very reliable. At least for the purpose in airgeddon which is to get just a single pmkid from a single target. It is supposed that airgeddon is a pentest tool to be launched over a specific target. That is one of the main reasons to not having "massive or random" attacks to surrounding APs and it's focused on a single target. The reason is that I want to be used mainly in legal and tailored wifi penetration tests. Let's see if this version finally is able to do what airgeddon needs. Need to do more testing to confirm but for now, I had bad results. I have no more time today to keep testing. I'll keep trying other day. |
Beta Was this translation helpful? Give feedback.
-
The BPF is merciless. This frames are filtered out: Explanation is here: |
Beta Was this translation helpful? Give feedback.
-
An example to reproduce wrong BPF techniques. To reproduce get the PMKID example hash from: store it to hc22000 file: hc22000 line in detail:
connvert it to cap file:
For this example:
unfiltere output:
Correct filtering (by e.g. wlan.bssid):
Now the impact of wrong filtering - we set the BSSID as wlan.ra (tcpdump syntax = wlan addr1):
The impact is huge. All wanted frames are filtered out! Why do I prefer the BPF? The user can decide which tool he would like to use and the way how he will use it. Different filtering, but same result. We filter by transmitter address instead of BSSID:
Now it's up to you to turn your good script into a fantastic script. |
Beta Was this translation helpful? Give feedback.
-
So you think I'm not getting the PMKID because the filter is not well prepared? ok, maybe... now let's create the right bpf file using tcpdump. Data and stuff the user have in airgeddon on PMKID menu: BSSID of the target Let's suppose they are: How could be the tcpdump right command to be used later on hcxdumptool to get a PMKID? Right now I have this: And then my hcxdumptool looks like this: Can you help me to generate a better or more precise bpf file to be able to get a PMKID of a target? I'm guessing based on your comments that a better bpf file could be this way: Configuring it and testing it in some minutes... EDIT Tested but it seems I'm not doing well something... |
Beta Was this translation helpful? Give feedback.
-
Ok, I was missing the "or" ... I added them and it worked!!!! Finally the tcpdump filter creation command was: And my tshark transformation over the right file worked flawlessy. So I think I have all I need. Thanks for the help and the patience 😄 |
Beta Was this translation helpful? Give feedback.
-
You're welcome. Would be nice if all this is helpful to improve airgeddon. Correct, this is the "all-in-one" solution that covers the target MAC in addr1 (ra) addrs 2 (ta) and addr 3 (bssid): |
Beta Was this translation helpful? Give feedback.
-
great, it works like a charm now. And I must admit it is faster now. I needed to perform so many changes, but it was worth in the end I think, you were right. The hardest part was to prepare the "structure" to keep it robust validating all and adding the new dependency to be checked only if version >=6.3.0 , etc etc... but now it is done, commit here: v1s1t0r1sh3r3/airgeddon@ef71d96 Regards. |
Beta Was this translation helpful? Give feedback.
-
I fully agree. BTW: |
Beta Was this translation helpful? Give feedback.
-
not sure if it worths to tune in more. Do you think could be interesting? as you know, we want only to get the needed stuff to get a valid PMKID and then it is supposed that is going to be cracked offline. That changes that you are suggesting could improve this in any way? |
Beta Was this translation helpful? Give feedback.
-
Le't say your hunting for three PMKIDs of three different NETWORKs:
create on filter for the three NETWORKs: and let hcxdumptool hunt for them: |
Beta Was this translation helpful? Give feedback.
-
Ok but as I said, in airgeddon everything is done intentionally only for a concrete target. It is designed to perform professional wifi audits. I removed the wlan addr1 and the wlan addr2 leaving only wlan addr3 in the filter whichs seems to be the only needed to get the PMKID. |
Beta Was this translation helpful? Give feedback.
-
Exactly that is the purpose of the BPF. |
Beta Was this translation helpful? Give feedback.
-
BTW: You should know that it destroy timestamps and remove the M3 and M4 eapol frames (AUTHORIZATION) and leave M1 and M2 only (CHALLENGE). Example and wpaclean are taken from latest git head aircrack-ng:
we do a clean: And this happens:
M3 and M4 are removed. After the cleaning procedure the user doesn't know if it is a challenge or if the CLIENT is authorized to join the NETWORK. |
Beta Was this translation helpful? Give feedback.
-
yeah, don't worry. We know it's not very reliable and sometimes may cause problems in the .cap file. It is warned always to the user before using it |
Beta Was this translation helpful? Give feedback.
-
just upgraded from a version from last year and whilst the new version works I do miss the old style --enable_status=XXX stuff as it was much easier to keep an eye on while doing other stuff
Beta Was this translation helpful? Give feedback.
All reactions