Replies: 43 comments
-
I think the most-frequently-asked-question currently is: why hcxdumptool doesn't accept some options, like The answer: |
Beta Was this translation helpful? Give feedback.
-
Major reason to move from -o to -w is the compatibility to tshark.
|
Beta Was this translation helpful? Give feedback.
-
Please explain in detail why it is not recommended to set monitor mode with third-party tools (iwconfig, iw, airmon-ng). By the way, I noticed that tcpdump can set it using option |
Beta Was this translation helpful? Give feedback.
-
For two reasons: I don't know what these scripts are exactly doing (set monitor mode, set active monitor mode, set passive monitor mode, add monitor mode, add virtual device in monitor mode, set interface rate, set bandwidth, ...). Depending on the capabilities of the device hcxdumptool set active monitor. If that is not supported, it set monitor passive mode. Additional it set lowest bandwidth and lowest rate to increase range before it set the device operational. If the user does not follow this recommendation, he will end up here:
and possible crash the driver. Linux kernel developers decided to show a warning since kernel 6.3: I added this suggestions, because I'm not a friend of shared virtual monitor interfaces. A simple example:
do the same by hcdumptool: check the state of the interface:
|
Beta Was this translation helpful? Give feedback.
-
If someone uses tools (like iwconfig or iw) or scripts (like airmon-ng) he should know what they are doing. |
Beta Was this translation helpful? Give feedback.
-
Added this to help:
|
Beta Was this translation helpful? Give feedback.
-
Please allow me to ask a question: |
Beta Was this translation helpful? Give feedback.
-
I'm not as swift as you, sorry. This sequence looks cumbersome and needs explanation (at least for me)
why not just
Why do some people need explanations and others don't? Feel free to ask me, I'll be glad to help. |
Beta Was this translation helpful? Give feedback.
-
OK a tcpdump example:
From man tcpdump:
The interface should be in monitor mode. But it is not!
the same running hcxdumptool:
As expected, the interface is in full operational monitor mode;
I'm sure you see the difference. If you use tcpdump, you should know its limitations. If you use hcxdumptool you should know that you don't need a third party tool. To avoid all this different states of monitor modes, hcxdumptool set an set appropriate monitor mode. My experience: |
Beta Was this translation helpful? Give feedback.
-
That was the bright site of tcpdump monitor mode.
hcxdumptool not:
|
Beta Was this translation helpful? Give feedback.
-
Of course, an experienced user can run a third party tool or a script to set monitor mode. He should know how to fix problems.
If you have some more questions, feel free to ask. |
Beta Was this translation helpful? Give feedback.
-
Wait... this command doesn't work
this command doesn't work either
only this command works
Looks like tcpdump set monitor mode only for itself. Two lines are enough, in my experience
I agree, no one will read a lengthy FAQ. |
Beta Was this translation helpful? Give feedback.
-
For sure it is enough and it will work. But if something went wrong, like here (done by iwconfig) To avoid problems (by e.g. additional virtual interfaces) my recommendation is to plug in the USB device. This command can't work, because the interface is not up.
tcpdump need an operational interface. This command will work, because tcpdump got an operational interface done by hcxdumptool:
Here tcpdump build the filter on a virtual interface (mon0), done by itself: So why should man create a filter on a virtual interface instead of using the same interface that is used for the attacks? |
Beta Was this translation helpful? Give feedback.
-
By this commit:
Please notice: |
Beta Was this translation helpful? Give feedback.
-
By latest commit: The same applies to help.
From now on, hcxdumptool accept raw BPF code, e.g. compiled by tcpdump (high level language) or by bpfc (low level assembly language) |
Beta Was this translation helpful? Give feedback.
-
I meant not sorted by RSSI, but with RSSI information in rcascan output a la version 6.2.9 |
Beta Was this translation helpful? Give feedback.
-
Yes, I know. But the entire radiotap header tag walk has been removed due to performance reasons. To get the relative RSSI we have to walk through the entire radio tap header on every received packet:
It will be much better to add an additional sort by "AP is an range" than doing this excessive talk walk. |
Beta Was this translation helpful? Give feedback.
-
BTW;
Dependent on the antennas, the radiotap header will grow up:
As you can see, the driver reported 3 different RSSI's: And some devices have 4 or more antennas... Shall I really re-implement this "meaningless" feature to display a relative RSSI. |
Beta Was this translation helpful? Give feedback.
-
Added PROBEREQUEST counter to rcascan mode. This new feature has no performance impact. BTW: I prefer a spectrum analyzer for these measurements. |
Beta Was this translation helpful? Give feedback.
-
rcascan with PROBERESPONSE sorting works, thank you. |
Beta Was this translation helpful? Give feedback.
-
RSSI is described in IEEE 802.11 (I think table 20). Unfortunately it is not standard and every vendor is handling this different. Unfortunately I often feel like a newbie. Everyday I learn something new. |
Beta Was this translation helpful? Give feedback.
-
I know that I know nothing |
Beta Was this translation helpful? Give feedback.
-
I agree, me too. |
Beta Was this translation helpful? Give feedback.
-
To make that more clear: It's not even necessary to run hcxdumptool with a status display. It can be completely disabled by Make file (hedless operation). Running with a good filter and the correct options, hcxdumptool will exactly do what is expected. However, if you really need the RSSI, you can get it via hcxpcapngtool offline. |
Beta Was this translation helpful? Give feedback.
-
it would be nice to remove the square brackets in both rcascan and attack mode.
BTW, is there a future for hcxdumptool if all devices use WPA3? |
Beta Was this translation helpful? Give feedback.
-
By latest commit the brackets CHA & FREQ have been removed. To distinguish between ESSID and PR counter, this brackets have not been removed.
I'm working on SAE. This requires direct cooperation between hcxdumptool and hashcat. |
Beta Was this translation helpful? Give feedback.
-
Typo in instead of
|
Beta Was this translation helpful? Give feedback.
-
Thanks, fixed. |
Beta Was this translation helpful? Give feedback.
-
Why are these flags "--disable_client_attacks", --enable_status=3 not working again and showing 'hcxdumptool: unrecognized option '--disable_client_attacks'' , 'hcxdumptool: unrecognized option '--enable_status=3''. what are the replacement flags? |
Beta Was this translation helpful? Give feedback.
-
Since version 6.3.0 several options have been changed (as mentioned in changelog):
"disable_client_attacks" has been replaced by "attemptclientmax" as explained in help:
"enable_status" has been replaced by "rds" as explained in help:
Reason for all this changes: better performance. |
Beta Was this translation helpful? Give feedback.
-
Instead of answering the same questions over and over again I decided to open a (general) discussion.
Introduction
You might expect me to recommend that everyone should be using hcxdumptool/hcxtools. But the fact of the matter is, however, that hcxdumptool/hcxtools is NOT recommended to be used by unexperienced users or newbees.
If you are not familiar with Linux generally or if you do not have at least a basic level of knowledge as mentioned in section "Requirements", hcxdumptool/hcxtools is probably not what you are looking for.
However, if you have that knowledge there’s no better toolkit than hcxdumtool/hcxtools.
Requirements
If you decide to compile latest git head, make sure that your distribution is updated to latest version.
Quick start
The basic workflow is detailed explained here:
workflow
It works on hashcat as well as on JtR.
History
The changelog give an overview about the major changes of hcxtools/hcxdumptool.
More and detailed information since the tools went open source is here
history of hcxdumptool
Nonce Error Corrections
hcxtools/hcxdumptool are able to detect a packet loss during dumping the WiFi traffic and report it to hashcat so that it can be compensated.
nonce error corrections
Plain Master Key Identifier
A Plain Master Key Identifier (PMKID) is an unique key identifier used by an ACCESS POINT (AP) to keep track of a Plain Master Key (PMK) from CLIENT.
PMKID
Beta Was this translation helpful? Give feedback.
All reactions