Hashcat Wireless
Post

Hashcat Wireless

Hashcat

Hashcat is a password cracking tool that was developed to primarily operate on systems with Graphical Processing Units (GPUs) from NVIDIA, AMD, and Intel.

A utility that is specifically relevant for our purposes is cap2hccapx. It exports WPA handshakes from PCAP files to HCCAPx, a format used by hashcat for WPA/WPA2 handshakes.

To install cap2hccapx run the sudo apt install hashcat-utils command. After installation, these utilities are found in /usr/lib/hashcat-utils.

You can run this command cp /usr/lib/hashcat-utils/cap2hccapx.bin /usr/bin to execute the binary from anywhere.

The hashcat module to crack WPA/WPA2 is 2500

We can pause (p) and resume (r) the hashcat execution

Extracting the Hash with AirCrack-NG

1
2
3
4
5
# It is also possible to extract a hash with aircrack
sudo aircrack-ng -J <myCapture> archivo.cap 

# Then you can use the utility hccap2john to extract for cracking
hccap2jhon <myCapture> > myHash

Extracting Hash with cap2hccapx.bin

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
# info about cracking hardware
hashcat -I 

# benchmark of all hash types (very slow)
hashcat -b

# benchmark a single hash type
hashcat -b -m 2500

# extract hashes from a cap file
cap2hccapx.bin file.cap output.hccapx

# Cracking passwords with hashcat
hashcat -m 2500 out.hccapx /usr/share/john/password.lst

# with -d we can choose the cracking device of the listed ones
hashcat64 -m 2500 -d 1 <pcap file> <wordlist>

# with --pot-file we can indicate another path to save the pot file

# install hashcat utilities (found in /usr/lib/hashcat-utils)
sudo apt install hashcat-utils

# convert PCAP file to HCCAPx file with a hashcat util
/usr/lib/hashcat-utils/cap2hccapx.bin wifu-01.cap output.hccapx