Home/Projects/

So you've (legally 🤨) deauthed some networks with an esp32 or pwnagotchi or whatever else and now have a bunch of pcap files to inspect. What now? Handshake extraction!


Note: This guide is intended for cracking password hashes with hashcat, but it should still work with John the Ripper

Steps:

1. If you don't already have your pcap files saved, do that first. You can use scp but I usually spawn a python server over ssh with python3 -m http.server

2. To extract the handshake from the pcap into a .hc22000 hash file, there are two main methods:

 - Easy method for one file: Use the convertor on the hashcat website
 - Better for multiple files: Use the hcxtools pcap convertor (installation and usage at the bottom)

3. Now that you have the extracted handshake, run hashcat with the hc22000 mode to crack it: hashcat -m 22000 -a 0 hs.hc22000 [wordlist]

4. I'd recommend for beginners to use rockyou.txt (download link here but you can also use more specific tactics like:

 - Phone number based on area code (hashcat -m 22000 hs.hc22000 -a 3 123?d?d?d?d?d?d?d)
 - Using the essids as a wordlist (see below)
 - Creating specific hashcat or JtR rules (outside the scope of this guide sorryyy)


Using hxctools:
1. Follow the instructions in the github repo to install (though I do believe it can be installed with apt on debian based systems)

2. There are multiple tools available, but in this case I used hcxpcapngtool with the command hcxpcapngtool *.pcap -o handshakes.hc22000

3. This saves every pcap in the current directory to one file so you can crack them all at once

4. Tip: you can add -E essid.wordlist to the end of the command to create an essid wordlist for hash cracking


Happy hacking c: (contact me if this makes no sense)

july 2024