Replies: 32 comments 78 replies
-
That is easy to explain and mentioned in README.md
As of today, only this is being tested:
to get an overview of the impact of activated real time display on performance (in combination with a new attack vector).
Compared to the current real time display, both save a lot of CPU cycles because APs on other channels are ignored by the real time display. As a result there is no longer need to disable the real time display (via Makefile) on headless operation All other combinations of command line options are untested, disabled or not working. |
Beta Was this translation helpful? Give feedback.
-
Form always follows function. I have a clear (non-negotiable) priority when testing/adding new features:
|
Beta Was this translation helpful? Give feedback.
-
Test hcxlabtool and hcxdumptool the attack power is no problem |
Beta Was this translation helpful? Give feedback.
-
BTW: There is no need to create a BPF as super user: |
Beta Was this translation helpful? Give feedback.
-
captured all AP list, display should be add in the box below
|
Beta Was this translation helpful? Give feedback.
-
Added rds=3 |
Beta Was this translation helpful? Give feedback.
-
When executing an attack, this client disconnec from AP connection, unable again auto connect to AP |
Beta Was this translation helpful? Give feedback.
-
If you know the ESSID, store it or other essids to a file e.g. named: essid.list Should work on both hcxdumptool and better (improved) on hcxlabtool. |
Beta Was this translation helpful? Give feedback.
-
I tested active and passive scan Should add mixed scan |
Beta Was this translation helpful? Give feedback.
-
Scanning methods explained: With regard to hcxdumpool:
That ( --rcascan=p+a) doesn't make sense! BTW: |
Beta Was this translation helpful? Give feedback.
-
hcxlabtool and hcxdumptool capture handshake message report seems to have not been improved |
Beta Was this translation helpful? Give feedback.
-
If an EAPOL M1M2M3 has been received, hcxlabtool stops its attacks immediately, Please check the time gap between the EAPOL MESSAGES displayed by Wireshark. But anyway, you can use hcxpcapngtool (option --eapoltimeout=x) on that dump file to convert the M1M2M3 regardless if the conditions are met or not. Plase note that hcxdumptool (hcxlabtool) is designed to run mostly headless. BTW:
hcxlabtool:
I'm undecided about the final values. Maybe something between 20000000 and 50000000 nsec, but never every greater. |
Beta Was this translation helpful? Give feedback.
-
Due the rapid popularity WIFI5, WIFI6, WIFI7,
If want to implement it, encode seems a bit much |
Beta Was this translation helpful? Give feedback.
-
Good idea in theory, but nor feasible an practice due to the high effort to code this:
I'm sure you have noticed that e.g. bgn (channel 1 to 11) is not equal to bgn (channel 1 to 13) is not equal to bgn (1 to 14): and nice to read: To avoid this (a hard coded list), the commended way (custom lists) is:
Create your custom scan lists, e.g.:
Run this before you start hcxdumptool or create a script that will do it or add the values to your .bash_profile to make them persistent. This shouldn't be a big challenge for an experienced user and it is a thousand times more flexible than to hard code it as you suggested. or inside a script:
That will work with frequencies too (-f option). Maybe I haven't mentioned that: I will not add functions that are covered by bash commands because that commands can do it much better than I ever could. A good starting point to learn bash: |
Beta Was this translation helpful? Give feedback.
-
All hcxtools and hcxdumptool/hcxlabtool are designed to run headless and/or inside custom scripts.
|
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
-
In channel 44
|
Beta Was this translation helpful? Give feedback.
-
Here is another debug version. We only need the debug messages - Please run without rds unzip and replace hcxlabtool.c by the attached version should look like this:
|
Beta Was this translation helpful? Give feedback.
-
[test.zip] |
Beta Was this translation helpful? Give feedback.
-
New debug version. Same procedure. Should now look like this: received BEACON |
Beta Was this translation helpful? Give feedback.
-
Yeah |
Beta Was this translation helpful? Give feedback.
-
Here we go. |
Beta Was this translation helpful? Give feedback.
-
Ok, next try: This "AKM value is 2" is important: |
Beta Was this translation helpful? Give feedback.
-
Next try please: |
Beta Was this translation helpful? Give feedback.
-
Use hcxdumptool capturing it , sometime success, but sometime fails, not every time success Including capturing other AP handshakes situation (not every time success) |
Beta Was this translation helpful? Give feedback.
-
Ok, here we go. Same procedure. ./hcxlabtool --bpf=your_filter -c 44b Debug info should look similar to this.
|
Beta Was this translation helpful? Give feedback.
-
Should be fixed by latest commit:
In case of WPA1/WPA2 mixed mode, both AKMs should be detected, now. |
Beta Was this translation helpful? Give feedback.
-
Test completed. due partial privacy, close |
Beta Was this translation helpful? Give feedback.
-
Why no scanning function
Use sudo ./hcxlabtool --rds=1
When switching to other channels, unable to see captured all AP list, display should be add in the box below
When using BPF
Create BPF
sudo ./hcxlabtool --bpfc="wlan addr3 c43306000000" >filter.bpf
Always stuck here, always waiting
Need add --rds to work
`sudo ./hcxlabtool -c 149b --bpf=filter.bpf --rds=3
Beta Was this translation helpful? Give feedback.
All reactions