It is much better to achieve gain using a good antenna instead of increasing transmitter power. The best high frequency amplifier is a good antenna! Realtek RTL8811AU, RTL8812AU, RTL 8814AU (due to NETLINK dependency) Intel PRO/Wireless (due to MICROCODE issues)īroadcom (neither monitor mode nor frame injection) If you need this features, do a request on Not recommended WiFi chipsets: No support for a driver which doesn't support monitor and packet injection, native Report related issues to the site, from which you downloaded the driver ![]() No support for a third party driver which is not part of the official kernel ( ) Third party drivers may not compile or work as expected on latest kernels Required driver: - interface must be set to monitor mode manually using iw before starting hcxdumptoolĪlways verify the actual chipset with 'lsusb' and/or 'lspci'!ĭue to a bug in xhci subsystem other devices may not work at the moment: RTL8188EUS 802.11n Wireless Network Adapter Partly driver freezes and overheating problems ID 0cf3:9271 Qualcomm Atheros Communications AR9271 802.11n This list is for information purposes only and should not be regarded as a binding presentation of the products: VENDOR MODEL Sometimes they add (v)ersion or (rev)vision. Manufacturers do change chipsets without changing model numbers. Get information about VENDOR, model, chipset and driver here: Virtual Netlink (libnl) interfaces are not supported! The driver must support monitor mode and full packet injection, as well as ioctl() system calls! Hcxdumptool need full (monitor mode and full packet injection running all packet types) and exclusive access to the adapter! Otherwise it will not start! If you decide to compile latest git head, make sure that your distribution is updated on latest version. To allow 5GHz packet injection, it is mandatory to uncomment a regulatory domain that support this: /etc/conf.d/wireless-regdom GPIO hardware mod recommended (push button and LED). ![]() (Recommended: Zero (WH) or A+, because of a very low power consumption), but notebooks and desktops may work, too. ![]() Gcc 10 recommended (deprecated versions are not supported: ) It may work on other Linux systems (notebooks, desktops) and distributions, too (no support for other distributions, no support for other operating systems).Ĭhipset must be able to run in monitor mode and driver must support monitor mode as well as full packet injection. Operatingsystem: Arch Linux (strict), Kernel >= 5.4 (strict). Just run ndk-build - built executables for some architectures should be created inside libs directory.Ĭopy it to your phone and enjoy. This repository cloned with all submodules ( -recursive flag in git clone or git submodules update command run) ![]() Hashcat or JtR: get PSK from hash Get sourceĪrch Linux pacman -S hcxtools Arch Linux ARMĪrch Linux ARM pacman -S hcxtools Black Archīlack Arch is an Arch Linux-based penetration testing distribution for penetration testers and security researchersĪndroid NDK installed in your system and in path variable Hcxeiutool: calculate wordlists from ESSID Hcxdumptool: attack and capture everything (depending on options) Hcxdumptool -> hcxpcapngtool -> hcxhashtool (additional hcxpsktool/hcxeiutool) -> hashcat or JtR Tool to run several tests to determine if ACCESS POINTs or CLIENTs are vulnerable Unsupported: Windows OS, macOS, Android, emulators or wrappers and NETLINK! Detailed description Tool Read this post: Hash mode 22000 explained ( ) Read this post: New attack on WPA/WPA2 using PMKID ( ) Read this post: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats ( ) Stand-alone binaries - designed to run on Arch Linux, but other Linux distributions should work, too.Ĭapture format pcapng is compatible to Wireshark and tshark. To reduce dump file size, gzip (.gz) compression is supported.Ĭonvert the pcapng file to WPA-PBKDF2-PMKID+EAPOL hashline (22000) with hcxpcapngtool (hcxtools)Īnd check if PreSharedKey or PlainMasterKey was transmitted unencrypted. To see if your ACCESS POINT or the CLIENT is vulnerable by using common wordlists. Small tool to capture packets from wlan devices and detect weak point within own WiFi networks.Īfter capturing, upload the "uncleaned" pcapng file here
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |