Replies: 7 comments 3 replies
-
All options are explained in help menu (-h) and here: Filtering is explained in help menu (--help) and here: There is no standard solution, because all options depend on task and target. Some examples (Linux stock kernel drivers) are here: A wiki is here: |
Beta Was this translation helpful? Give feedback.
-
Thanks for explaining your workflow. That is really helpful for new users of hcxdumptool/hcxtools. I admit that neither hcxdumptool nor hcxtools are easy to use (because we are not on beginner level), so please let me add some additional information: To get an overview of crowded channels, running rcascan in combination with -F is a good idea. hcxdumptool does the standard attacks against APs to get a 4way handshake and it does attacks to retrieve a PMKID. BTW: To figure out, which information hcxdumptool retrieves, just run it for a while and convert the dump file by hcxpcapngtool. |
Beta Was this translation helpful? Give feedback.
-
Thanks a lot for your reply.
You have said that
I understood most of this in theory, but dont know the commands. If I am using MAC filter with BPF, why do I need to give the essid list? (and if I use filters, you said that 75% capabilities of the tool are not used. May I know which attack types are not used?). And what is the use of GPS? wardriving? Clearly I have close to 0 knowledge. Is there a knowledge base or a list of resources so that users can at least understand the wifi security/tool, its capabilities, and how to approach and use it so that the success rate will be much higher. Approx what percent of networks have weak clients? And do they ever include modern devices? |
Beta Was this translation helpful? Give feedback.
-
If a user types the PSK into the ESSID field and the ESSID into the PSK field of the device, the device is vulnerable. $ whoismac -m 48760412d6e9 There are a lot more. Please check: One single "weak" CLIENT will compromise an entire enterprise network. The essid list is not a filter list. This list is used to respond to undirected PROBEREQUESTs. If a CLIENT receive its assigned ESSID, it will try to connect. If that happens, hcxlabtool respond and request the CLIENTs M2. If you filter by MAC AP, all CLIENTs are not allowed to connect to hcxlabtool/hcxdumptool! Unfortunately hcxlabtool/hcxdumptool is focused on this attacks, which are now permitted. Some users requested GPS support, e.g. to upload the position to wigle. |
Beta Was this translation helpful? Give feedback.
-
A good starting point is this: The frames types are explained here, too: Recommended network analyzing tools to reproduce all lessons (run in parallel with hcxlabtool/hcxdumptool): |
Beta Was this translation helpful? Give feedback.
-
Unfortunately, I can't give a recommendation. Major reason is that VENDORS often change the chipset (rev 1, rev 2, rev A, rev X) , but use the old case and the old packaging. Often the seller will not be informed about this. Luckily the wiki of OpenWRT is very good (regarding the firmware): Luckily the wiki (chipsets) is very good (regarding monitor mode and packet injection): Now you have to find the right combination of (hardware supported by OpenWRT) and chipset with monitor mode capabilities. BTW: If you decide to run OpenWRT (recommended on small systems like a Raspberry Pi or a router) you should know that a standard image will not work as expected. hcxlabtool/hcxdumptool will work fine: The same thing I wrote about OpenWRT, but also applies Linux. A standard installation include several running services you don't need/want. |
Beta Was this translation helpful? Give feedback.
-
The wiki page was not created by me and you're absolutely right: It is outdated and I have removed it. |
Beta Was this translation helpful? Give feedback.
-
All of the tutorial I saw use some arguments such as active_beacon etc but I noticed that it does not work in the latest version . What is its replacement in the latest version ?
Beta Was this translation helpful? Give feedback.
All reactions