Skip to content

ivy00johns/pwnagotchi-tools

 
 

Repository files navigation

Pwnscription

REPO MIGRATION

I have moved my project to a non-forked repo that is located here: https://github.com/ivy00johns/Pwnscription

██████╗ ██╗    ██╗███╗   ██╗███████╗ ██████╗██████╗ ██╗██████╗ ████████╗██╗ ██████╗ ███╗   ██╗
██╔══██╗██║    ██║████╗  ██║██╔════╝██╔════╝██╔══██╗██║██╔══██╗╚══██╔══╝██║██╔═══██╗████╗  ██║
██████╔╝██║ █╗ ██║██╔██╗ ██║███████╗██║     ██████╔╝██║██████╔╝   ██║   ██║██║   ██║██╔██╗ ██║
██╔═══╝ ██║███╗██║██║╚██╗██║╚════██║██║     ██╔══██╗██║██╔═══╝    ██║   ██║██║   ██║██║╚██╗██║
██║     ╚███╔███╔╝██║ ╚████║███████║╚██████╗██║  ██║██║██║        ██║   ██║╚██████╔╝██║ ╚████║
╚═╝      ╚══╝╚══╝ ╚═╝  ╚═══╝╚══════╝ ╚═════╝╚═╝  ╚═╝╚═╝╚═╝        ╚═╝   ╚═╝ ╚═════╝ ╚═╝  ╚═══╝

DISCLAIMER

This project is for WiFi security education purposes ONLY!

Hacking WiFi networks that you DO NOT OWN IS ILLEGAL!


Purpose

I created this project to make the process of cracking Wi-Fi handshakes gathered by a Pwnagotchi using the Hashcat tooling, on both OS X and Windows, easier by generating the necessary terminal commands for you.

Pwnagotchi Logo

In order to create the project I started by combining and refactoring different repos that were no longer maintained.

Included Tooling

  • npm run get: OS X - Download the .pcap files from your Pwnagotchi.
    • npm run vagrant-up: Windows - Download the .pcap files from your Pwnagotchi.
    • npm run vagrant-destroy: Windows - Delete the Vagrant image when you are done.
  • npm run generate: Generate the .hc22000 and .pmkid files for hashcat to crack based on the .pcap files you download.
  • npm run attacks: Generate a list of attacks based on the variables listed in the config.js file.
  • npm run scripts: Generate a list of attack scripts based on the attacks-list.js file.
  • npm run results: Displays a list of cracked networks in the terminal.
  • npm run passwords: Generate a custom wordlist containing all combinations of the WORD_LIST in the config.js file.
  • npm run combos: Generate the results of what happens when a .rule file is applied to a wordlist file for a better understanding of what .rule files do in hashcat.
  • npm run cli: Run the availabe npm run commands as well as building hashcat scripts quickly.

Table Of Contents

Dependencies

OS X Dependencies

Windows Dependencies

  • NodeJS
  • Vagrant
  • Virtual Box
    • Vagrant and Virtual Box are only used to convert .pcap files to the corresponding .hccapx/.pmkid files.
  • Hashcat v6.2.6 binaries
    • Make note of the PATH to where you unpacked Hashcat.
      • Example: C:\\Users\\XXXXXX\\hashcat-6.2.6\\

Pwnagotchi Setup

Images/Config Files

I've included a number of default.toml files for the different Pwnagotchi images you can find as I found them helpful when configuring my Pwnagotchi. I've also included a minimal-config.toml file with the bare minimal configuration settings to get a Pwnagotchi up and running.

Repo Default Local
Original default.toml ./pwnagotchi/defaults-original.toml
Torch default.toml ./pwnagotchi/defaults-torch.toml
Aluminum-Ice default.toml ./pwnagotchi/defaults-aluminum-ice.toml

OS X Setup

Windows Setup

Installation

OS X Installation

  • git clone https://github.com/ivy00johns/pwnagotchi-tools/
  • npm install
  • brew install hcxpcaptool
  • brew install hashcat

Windows Installation

  • git clone https://github.com/ivy00johns/pwnagotchi-tools/
  • npm install

Initial Configuration

OS X Configuration

  1. cp .config.example .config
  2. Set the details for your Pwnagotchi:
    ...
    // Pwnagotchi SSH configuration
    PWNAGOTCHI_SSH: {
    	HOST_ADDRESS: "", // Pwnagotchi SSH host address
    	USERNAME: "", // Pwnagotchi SSH username
    	PASSWORD: "", // Pwnagotchi SSH password
    	PORT: 22 // Pwnagotchi SSH port
    },
    ...

Windows Configuration

  1. cp .config.example .config
  2. Set the details for your Pwnagotchi:
    ...
    // Pwnagotchi SSH configuration
    PWNAGOTCHI_SSH: {
    	HOST_ADDRESS: "", // Pwnagotchi SSH host address
    	USERNAME: "", // Pwnagotchi SSH username
    	PASSWORD: "", // Pwnagotchi SSH password
    	PORT: 22 // Pwnagotchi SSH port
    },
    
    // Windows configuration
    WINDOWS: true, // Flag to indicate if running on Windows
    HASHCAT_PATH: "C:\\[PATH]\\hashcat-6.2.6", // Path to Hashcat on Windows
    ...

Additional Configuration Steps

Wordlists

By default this repo contains a single popular large wordlist, ./hashcat/wordlists/rockyou.txt.gz (~54 MB), that you will need to unzip (~140 MB). You will want to download additional ones to work with as well. You can place any new wordlists in the provided ./hashcat/wordlists directory, or reference the directory path in the .config.js file.

...
WORDLISTS: [
	"./hashcat/wordlists",
],
...
...
WORDLISTS: [
	"./hashcat/wordlists/rockyou.txt",
],
...

Unzip rockyou.txt.gz

Unzip OS X

  1. gzip ./hashcat/wordlists/rockyou.txt.gz --keep

Unzip Windows

  1. tar -zxvf .\hashcat\wordlists\rockyou.txt.gz

Known Password Wordlist

  • You can add your own known or suspected passwords by cloning the example wordlist and/or dictionary file and editing it.
    1. cp ./hashcat/known-passwords.example.txt ./hashcat/wordlists/known-passwords.txt
    2. cp ./hashcat/known-passwords.example.dic ./hashcat/wordlists/known-passwords.dic

Custom Wordlists

You can generate a list of possible passwords based on a couple of clues that could have be used to build the password you want to crack.

...
// General configurations
PRINT_ITEMS: 10, // Number of items to print in the terminal
GENERATE_PERMUTATIONS: 2000, // Number of permutations to generate and add to the .txt file
EXPORT_FILE_NAME: "./hashcat/wordlists/generated-passwords.txt", // Name of the exported file
WORD_LIST: [], // List of words for generation
MAX_WORDS_USED: 2, // Max number of words that can be combined to form a given string
...
  1. Edit the config.js file and add your clues to the WORD_LIST: [] array.
    • WORD_LIST: [A, B, C, D, E]
  2. Set the MAX_WORDS_USED variable to configure how many words will be contained in the final results:
    • 1 => [A, B, C, D, E] - 5 results
    • 2 => [A, B, C, D, E, AB, AC, AD, AE, BA, BC, BD, BE, CA, CB, CD, CE, DA, DB, DC, DE, EA, EB, EC, ED] - 25 results
    • Etc...
  3. Run the npm run passwords command to generate a list of possible password combinations.
    • ["A", "AB", "AC", "AD", "AE", "B", "BA", "BC", "BD", "BE", "C", "CA", "CB", "CD", "CE", "D", "DA", "DB", "DC", "DE", "E", "EA", "EB", "EC", "ED"]
  4. It will export the list to a .txt file at the specificed location, EXPORT_FILE_NAME, by default:
    • ./hashcat/wordlists/generated-passwords.txt
  5. For example say you set the WORD_LIST: to ["cat", "dog", "rat"], you would get the following results:
    cat
    catdog
    catrat
    dog
    dogcat
    dograt
    rat
    ratcat
    ratdog
    
  6. You can then use the generated-passwords.txt file to try and crack the network passowrd by running npm run scripts again and looking for the wordlist in the generated script file for a given network.

Standalone Wordlists

Standalone Dictionaries

Massive Wordlists

Misc Wordlists

Rules

Hashcat Rules

Hashcat rules are a powerful tool for generating password candidates based on patterns and rules. They can be used to crack passwords that follow specific patterns, such as those that use common words, numbers, or symbols. Hashcat rules can also be used to generate passwords that are more complex and less likely to be guessed.

Here is a brief explanation of some of the basic Hashcat rules:

Case modification rules: These rules change the capitalization of letters in a word. For example, the l rule converts all letters to lowercase, the u rule converts all letters to uppercase, and the c rule capitalizes the first letter of each word.

String manipulation rules: These rules add, remove, or modify characters in a word. For example, the $N rule appends a character to the end of each word, the ^N rule prefixes a character to the start of each word, and the d rule duplicates each word in the wordlist.

Reversal rules: These rules reverse the order of letters in a word. For example, the r rule reverses each word in the wordlist.

Conditional rules: These rules control which password candidates are generated. For example, the ?N rule skips passwords that do not contain a specific character, and the !N rule skips passwords that contain a specific character.

Hashcat rules can be combined in a variety of ways to create complex password-generation patterns. For example, the following rule generates passwords that are at least six characters long and start with a lowercase letter:

?l?l?l?l?l?l

This rule will skip any passwords that are less than six characters long or do not start with a lowercase letter. It will then generate all possible combinations of lowercase letters, numbers, and symbols to create passwords that meet these criteria.

Hashcat rules are a powerful tool for cracking passwords, but they are also a valuable asset for security researchers. By understanding how Hashcat rules work, security researchers can develop better defenses against password-based attacks.

Here are some additional resources for learning more about Hashcat rules:

Included Rules

Rule Combinations Generation

Are you interested in what a .rule file generates? I've include the logic to help answer this questions.

  • In the config.js file there are a few variables to help with this process. In them you can point to specific .rule and .txt files to create a list of the results when they are combined. By default it uses the base-word.txt file that contains the word password, and points to the base64 rule set.
     ...
     // Rule list permutations configurations
     TEST_WORD_LIST: "./hashcat/generator/base-word.txt",
     TEST_RULES_FILE: "./hashcat/rules/_NSAKEY.v2.dive.rule",
     RESULTS_DIRECTORY: "./hashcat/generator/results",
     GENERIC_RESULTS_FILENAME: "wordlist-plus-rule-combinations.txt"
     ...
  1. Run the npm run combos command to generate the list of strings that hashcat will generate in its work.
  2. With the default configuration you will get the following results, truncated for readability.
    password
    sswordpasswordpa
    swordpas
    wordpass
    ordpassw
    rdpasswo
    passwore
    passwora
    dpasswor
    sswordpa
    
  3. By default the results each of the provided .rule files applied to the word password is provided in the ./hashcat/generator/results directory.

PLEASE NOTE: There are certain rules in some .rule files that are not currently implemented in the wordlist-combinations-generator.js logic so the x variations counts can be lower than expected.

Masks

Masks are used for brute-forcing attacks by defining the characters and their positions in the password. A mask consists of placeholders for characters, where each placeholder represents a specific character set. The possible character sets include:

?l: Lowercase letters (a-z)
?u: Uppercase letters (A-Z)
?d: Digits (0-9)
?s: Special characters
?a: Lowercase letters, uppercase letters, and digits
?b: Custom characters (you define them)
Here's an example mask: ?l?l?l?d?d?s. In this mask:

The first three characters represent lowercase letters.
The next two characters represent digits.
The last character represents a special character.
Now, let's calculate the number of combinations. For each placeholder in the mask, the number of possibilities is the size of the character set it represents.

Lowercase letters (?l): 26 possibilities
Digits (?d): 10 possibilities
Special characters (?s): It depends on the specific character set used (e.g., 32 for default special characters)
So, for the example mask ?l?l?l?d?d?s:

26 × 26 × 26 × 10 × 10 × 32 = 449, 945, 920

This is the total number of combinations that hashcat will attempt for this specific mask. Keep in mind that the actual time it takes to crack a password depends on factors such as the hashing algorithm, hardware performance, and the complexity of the password.

Included Masks

This repo contains the standard masks included in the hashcat repository.

  • 8char-1l-1u-1d-1s-compliant.hcmask
  • 8char-1l-1u-1d-1s-noncompliant.hcmask
  • hashcat-default.hcmask
  • rockyou-1-60.hcmask
  • rockyou-2-1800.hcmask
  • rockyou-3-3600.hcmask
  • rockyou-4-43200.hcmask
  • rockyou-5-86400.hcmask
  • rockyou-6-864000.hcmask
  • rockyou-7-2592000.hcmask

Scripts

CLI

Are you looking to quickly build and execute hashcat commands? Well you are in luck, I have added cli tooling to do just that.

  1. Run npm run cli to get started.
  2. If you select Standard Commands you can execute one of the npm run commands listed in the package.json.
    1. Then select the command that you would like to execute.
  3. If you select Custom Command you can build a custom command.)
    1. Select a .hc22000 file that you would like to crack.
    2. Select a wordlist you'd like to use, you can also select "NONE" as an option.
    3. Select a rule you'd like to use, you can also select "NONE" as an option.
  4. You can choose to either Execute the command or Copy to Clipboard.

Copy the .PCAP files to your machine.

To copy the .pcap files from your Pwnagotchi run the following script. It will copy the files from the /root/handshakes directory on the Pwnagotchi to one that you can access from your machine, /usr/[USERNAME]/handshakes. Then it will copy the /usr/[USERNAME]/handshakes directory to your machine, in the ./handshakes/pcap directory.

  • npm run get

Generate the .HC22000/.PMKID files.

To generate the necessary .hc22000/.pmkid files needed to crack the WiFi handshakes run the following script.

OS X - Generate

  • npm run generate

Windows - Generate

  • npm run vagrant-up

Issue

  • When you run the npm run generate command you will see the following message that I am trying to resolve. It says it found no files when it did indeed generate the files.
     Skipping: .gitkeep
     .gitkeep successfully skipped.
    
     Processing: EXAMPLE_c8d71922525c.pcap
     No PMKID or HCCAPX found.
    
     Processing: EXAMPLE_3c7a8a78adb8.pcap
     No PMKID or HCCAPX found.
    
     Processing: EXAMPLE_a41162403502.pcap
     No PMKID or HCCAPX found.

Generate the list of attacks.

  • To generate the list of attack combinations based on the variables outlined in the .config file, run the following script. It will generate the attacks-list.js file in the ./hashcat/attacks-list directory.
    • npm run attacks
      • When ever you modify the WORDLISTS, DICTIONARIES, RULES, and/or MASKS variables in the .config file, make sure to rerun this script before running the npm run scripts command.

Combinations

This script will generate a list of attacks based on the following combinations.

--attack-mode=0
.txt X .rule
.dic X .rule
.rule x mask
.rule
.txt
.dic

--attack-mode=3
mask

--attack-mode=6
.txt X mask
.dic X mask

Output Example

const attacks = [
  [
	"--attack-mode=0",
	"./wordlists/known-passwords.txt",
	"./hashcat/rules/wifi.rule"
  ],
  [
	"--attack-mode=0",
	"./wordlists/known-passwords.dic",
	"./hashcat/rules/wifi.rule"
  ],
  [
	"--attack-mode=0",
	"",
	"./hashcat/rules/wifi.rule"
  ],
  [
	"--attack-mode=3",
	"",
	"?h?h?h?h?h?h?h?h"
  ],
  [
	"--attack-mode=6",
	"./wordlists/known-passwords.txt",
	"?h?h?h?h?h?h?h?h"
  ],
  [
	"--attack-mode=6",
	"./wordlists/known-passwords.dic",
	"?h?h?h?h?h?h?h?h"
  ]
];

Generate the attack scripts.

To generate the necessary scripts to crack the WiFi handshakes based on the ./hashcat/attacks-list/attacks-list.js file, run the following script.

  • npm run scripts

Command Breakdown

  • hashcat - "Hashcat is the world’s fastest CPU-based password recovery tool."
  • --hash-type=22000 - Hash type: WPA2-PSK
  • --attack-mode=0 - Attack mode: Straight
  • --session "[HC22000_FILE_NAME]_[RANDOM-NUMBER]" - Specify a name for the cracking session which is useful for keeping track of multiple cracking sessions.
  • --hwmon-temp-abort=100 - Abort temperture: 100 C
    • -w 2 - Wait for 2 seconds after reaching the abort temperature before shutting down.
  • --potfile-path="./hashcat/potfiles/[HC22000_FILE_NAME]_[RANDOM-NUMBER]-potfile.txt" - The potfile is a file that stores the hashes that have been cracked by hashcat. This allows hashcat to resume cracking a hash from where it left off if the process is interrupted
  • --outfile="./hashcat/outputs/[HC22000_FILE_NAME]_[RANDOM-NUMBER]-output.txt" - The output of the command should be written to a file instead of being displayed on the terminal.
  • "./handshakes/hccapx/[HC22000_FILE_NAME].hc22000" - The targetted .hc22000 file that needs to be cracked.
  • --rules-file="./hashcat/rules/[RULES_NAME].rule" - The file that contains the rules for generating password candidates.
  • "./wordlists/[PASSWORDS_LIST_NAME].txt" - List of passwords.
  • "?h?h?h?h?h?h?h?h" - A mask is a string of characters that represents the structure of a password. It uses placeholders to indicate which characters can be used at each position in the password. This allows hashcat to generate password candidates more efficiently than a brute-force attack, which would try every possible combination of characters.

Attack Command Examples

--attack-mode=0

hashcat --hash-type=22000 --attack-mode=0 --session [HC22000_FILE_NAME]_[RANDOM-NUMBER] --hwmon-temp-abort=100 -w 2 --potfile-path "./hashcat/potfiles/[HC22000_FILE_NAME]_[RANDOM-NUMBER]-potfile.txt" --outfile="./hashcat/outputs/[HC22000_FILE_NAME]_[RANDOM-NUMBER]-outfile.txt" "handshakes/hccapx/[HC22000_FILE_NAME].hc22000" --rules-file="./hashcat/rules/[RULES_NAME].rule" -S "wordlists/[PASSWORDS_LIST_NAME].txt"

--attack-mode=3

hashcat --hash-type=22000 --attack-mode=3 --session [HC22000_FILE_NAME]_[RANDOM-NUMBER] --hwmon-temp-abort=100 -w 2 --potfile-path "./hashcat/potfiles/[HC22000_FILE_NAME]_[RANDOM-NUMBER]-potfile.txt" --outfile="./hashcat/outputs/[HC22000_FILE_NAME]_[RANDOM-NUMBER]-outfile.txt" "handshakes/hccapx/[HC22000_FILE_NAME].hc22000" "[MASK]"

--attack-mode=6

hashcat --hash-type=22000 --attack-mode=6 --session [HC22000_FILE_NAME]_[RANDOM-NUMBER] --hwmon-temp-abort=100 -w 2 --potfile-path "./hashcat/potfiles/[HC22000_FILE_NAME]_[RANDOM-NUMBER]-potfile.txt" --outfile="./hashcat/outputs/[HC22000_FILE_NAME]_[RANDOM-NUMBER]-outfile.txt" "handshakes/hccapx/[HC22000_FILE_NAME].hc22000" "wordlists/[PASSWORDS_LIST_NAME].txt" "[MASK]"

Execute the handshake attacks.

OS X Execution

  • Locate the necessary .sh file in the ./hashcat/attack-scripts directory.
  • Run the script:
    • ./hashcat/attack-scripts/NETWORK_a0648f5681d7.sh

Windows Execution

  • Locate the necessary .bat file in the .\hashcat\attack-scripts directory.
  • Run the script:
    • .\hashcat\attack-scripts\NETWORK_a0648f5681d7.bat

Example Terminal Output

hashcat (v6.2.6) starting

* Device #2: Apple's OpenCL drivers (GPU) are known to be unreliable.
             You have been warned.

METAL API (Metal 341.16)
========================
* Device #1: Apple M1, 5408/10922 MB, 8MCU

OpenCL API (OpenCL 1.2 (Aug  5 2023 05:54:47)) - Platform #1 [Apple]
====================================================================
* Device #2: Apple M1, skipped

Minimum password length supported by kernel: 8
Maximum password length supported by kernel: 63

Hashes: 36 digests; 12 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates

Optimizers applied:
* Zero-Byte
* Single-Salt
* Slow-Hash-SIMD-LOOP

Watchdog: Temperature abort trigger set to 100c

Host memory required for this attack: 281 MB

Dictionary cache hit:
* Filename..: wordlists/known-passwords.txt
* Passwords.: 2
* Bytes.....: 17
* Keyspace..: 20000

The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework

Approaching final keyspace - workload adjusted.           

Cracking performance lower than expected?                 

* Append -w 3 to the commandline.
  This can cause your screen to lag.

* Update your backend API runtime / driver the right way:
  https://hashcat.net/faq/wrongdriver

* Create more work items to make use of your parallelization power:
  https://hashcat.net/faq/morework

[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit => q

Session..........: EXAMPLE_a0648f5681d7_6215          
Status...........: Quit
Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL)
Hash.Target......: handshakes/hccapx/EXAMPLE_a0648f5681d7.hc22000
Time.Started.....: Sun Nov 12 20:02:04 2023 (44 secs)
Time.Estimated...: Sun Nov 12 21:02:18 2023 (59 mins, 30 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (wordlists/known-passwords.txt), Left Side
Guess.Mod........: Mask (MYWIFI?d?d?d?d) [10], Right Side
Guess.Queue.Base.: 1/1 (100.00%)
Guess.Queue.Mod..: 1/1 (100.00%)
Speed.#1.........:        6 H/s (0.27ms) @ Accel:1024 Loops:8 Thr:32 Vec:1
Recovered........: 0/12 (0.00%) Digests (total), 0/12 (0.00%) Digests (new)
Progress.........: 244/20000 (1.22%)
Rejected.........: 0/244 (0.00%)
Restore.Point....: 0/2 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:122-123 Iteration:0-12
Candidate.Engine.: Device Generator
Candidates.#1....: passwordMYWIFI0777 -> passwordMYWIFI0777
Hardware.Mon.#1..: Util: 95%


Session..........: EXAMPLE_a0648f5681d7_6215
Status...........: Quit
Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL)
Hash.Target......: handshakes/hccapx/EXAMPLE_a0648f5681d7.hc22000
Time.Started.....: Sun Nov 12 20:02:04 2023 (44 secs)
Time.Estimated...: Sun Nov 12 21:02:18 2023 (59 mins, 30 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (wordlists/known-passwords.txt), Left Side
Guess.Mod........: Mask (MYWIFI?d?d?d?d) [10], Right Side
Guess.Queue.Base.: 1/1 (100.00%)
Guess.Queue.Mod..: 1/1 (100.00%)
Speed.#1.........:        6 H/s (0.27ms) @ Accel:1024 Loops:8 Thr:32 Vec:1
Recovered........: 0/12 (0.00%) Digests (total), 0/12 (0.00%) Digests (new)
Progress.........: 244/20000 (1.22%)
Rejected.........: 0/244 (0.00%)
Restore.Point....: 0/2 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:122-123 Iteration:0-12
Candidate.Engine.: Device Generator
Candidates.#1....: passwordMYWIFI0777 -> passwordMYWIFI0777
Hardware.Mon.#1..: Util: 95%

[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit => Started: Sun Nov 12 20:01:49 2023
Stopped: Sun Nov 12 20:02:49 2023

Cracked Networks Results

  1. Run npm run results to check which networks have been successfully cracked.
  2. Example results:
╔══════════════╤══════════╤═══════════════════════════╗
║ NETWORK NAME │ PASSWORD │ a0648f5681d7:92b3f0038eed ║
╚══════════════╧══════════╧═══════════════════════════╝

CLI

Are you looking to build and execute hashcat commands quickly based on the files you've already generated? Well you are in luck, I have added cli tooling to do just that.

  1. Run npm run cli to get started.
  2. If you select Standard Commands you can execute one of the npm run commands listed in the package.json file.
    1. Then select the command that you would like to execute.
  3. If you select Custom Command you can build a custom command based on existing files.
    1. Select a .hc22000 file that you would like to crack.
    1. Select a wordlist you'd like to use, you can also select "NONE" as an option. *
    2. Select a rule you'd like to use, you can also select "NONE" as an option.
  4. Then you can choose to either Execute the command or Copy to Clipboard.

Troubleshooting

Issue #1 - TBD


Links


TO-DO

  • Correct the counters staying at 0 even though keys are located and files are generated.
     Processing: EXAMPLE_c8d71922525c.pcap
     No PMKID or HCCAPX found.
  • Make it so you can generate list for each .rule file in the directory, if one is listed.
  • Find better names for the functions and commands.
  • Move logos to there own file.
  • Update README examples for geenrated commands.
  • Add .dic support.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • JavaScript 100.0%