Filter Option on new Hcxdumptool Version #388
Replies: 48 comments 89 replies
-
Build a Berkeley Paket Filter and load it by hcxpcapngtool's option --bpf="your_filter.bpf" A simple attack filter: To build a BPF it is mandatory to understand the addresses (addr1 add2 and addr3) of a 802.11 MAC header Another example to attack 2 APs (AP1 11:22:33:44:55:66 and AP2 aa:bb:cc:dd:ee:ff) If hcxdumptool has been compiled with enabled internal BPF compiler, it is possible to build the filter by |
Beta Was this translation helpful? Give feedback.
-
65535 is the size of the read buffer for incoming packets. Some of hcxdumptool's attack vectors are working on NETWORKs running MFP (802.11w). |
Beta Was this translation helpful? Give feedback.
-
" wlan addr3 112233445566" is a very simple BPF,. Running it, you'll get a warning from hcxpcapngtool when converting the dump file to a hash file, because a lot of useful frames (e.g. undirected PROBEREQUESTs to wildcard SSID) are filtered out. |
Beta Was this translation helpful? Give feedback.
-
Management Frame Protection (MFP) is a mechanism that prevent that a CLIENT can be deauthenticated from an AP by injecting DEAUTHENTICATION or DISASSOCIATION frames. As a result, this stupid attack will not work any longer. If hcxdumptool print a warning or an information, there is something wrong with the dump tool or the work flow. |
Beta Was this translation helpful? Give feedback.
-
An example:
This always happens if you apply an attack filter like this one: Building a filter like this one does not filter this frames out and the information message is now longer shown: BTW: |
Beta Was this translation helpful? Give feedback.
-
The reason I keep asking you about the MFP because I ran this tool several times on my network and it seems unable to collect the handshake / pmkid on it, By referring to the legend indicator on hcxdumptool, there's nothing captured that I can work on hashcat / jtr. |
Beta Was this translation helpful? Give feedback.
-
@ZerBea Can you specify 1 command that can we use to capturing data on MFP enabled network ? I temporary use
And it seems unable to capture my network handshake / pmkid, Im referring to the legend indicator, It didn't appear any star below the number that hashcat/jtr can work on. |
Beta Was this translation helpful? Give feedback.
-
The problem is this option "-F". Get operating channel (--rcascan=active). Make sure you're running latest git head. |
Beta Was this translation helpful? Give feedback.
-
A quick test on a MFP enabled NETWORK:
Running a filter is not needed, because the TEST NETWORK is the only one on channel 13a here.
|
Beta Was this translation helpful? Give feedback.
-
Test NETWORK has been attacked successful and hash has been converted successful.
|
Beta Was this translation helpful? Give feedback.
-
Now I try the same, running a filter:
|
Beta Was this translation helpful? Give feedback.
-
Due to the filter code, the second attack has been faster:
and less packet has been captured:
All (for this test) unwanted packets have been filtered out (that include M3 messages), because we don't need them to confirm that everything is working as expected. |
Beta Was this translation helpful? Give feedback.
-
A good step would be to examine the differences between your configuration and mine:
|
Beta Was this translation helpful? Give feedback.
-
@ZerBea Hi, thank you so much for your clear explanation and shown me some usage example. So it is possible to capture a handshake / pmkid on MFP AP. How about if the AP is dual band? For example like : TestAP-2.4ghz (MFP Enabled) It is still possible to capture the data on that particular network ? Even is my wireless card is support dual band, I only need to targeting my own 2.4ghz band is enough isn't it ?? or should I run 2 hcxdumptool on the same time ? One is for the 2.4ghz and the other for 5ghz? Sorry for my newbie questions, this newer version its quite confusing me atm due to the command changes and the different output we are getting. Seems like a brand new tool for me which is more powerful. I did do my google research but I can say 99% guide are using the old command which technically not working anymore on this newer version of hcxdumptool. |
Beta Was this translation helpful? Give feedback.
-
If I understand it correct: build a filter: and get the operating channel e.g. 6a Important notice: By default hcxdumptool attacks WPA-PSK APs and CLIENTs on channels 1a,6a,11a |
Beta Was this translation helpful? Give feedback.
-
Although purpose is same, but their use concepts diff If use simpler and easier , all people will move to hcxdumptool |
Beta Was this translation helpful? Give feedback.
-
The BPF way.
Run hcxdumptool with the desired BPF:
|
Beta Was this translation helpful? Give feedback.
-
I don't relationship, I just agreed he the issues |
Beta Was this translation helpful? Give feedback.
-
Hi @ZerBea , when I run for a while this command :
I got this output which means exit on eapol M1M2 I thought I was succesfully captured the necessary files for my target network (DilaAnuar), but when I try to convert the pcapng file using the hcxpcapngtool it gave me this error.
do you know why? thanks in advance ? @ZerBea |
Beta Was this translation helpful? Give feedback.
-
No packets going to the AP inside the dump file:
But a lot coming from the AP:
|
Beta Was this translation helpful? Give feedback.
-
@hyekalhitech Hello You should conduct in 15m range test capture ( MFP AP ) |
Beta Was this translation helpful? Give feedback.
-
I think i have something that will address the single network targeting issue i know a lot of folks that use this are facing. Was able to make some mods to hcxdumptool to automate creation of BPF for a single BSSID. Added --bssid / -b option to pass mac address:
This merely makes targeting a single network a much faster processing than having to build the tcpdump command string every time and makes pivoting a much faster and more successful experience. Any interest in integrating this? |
Beta Was this translation helpful? Give feedback.
-
Hi @ZerBea , so here is my latest update about trying to capturing a handshake / pmkid regarding my targetted network : DilaAnuar. I ordered a new antenna to make sure that everything is working perfectly but unfortunately my parcel got missing from the courier services and got my refund. So I didn't have the new antenna to test it out with hcxdumptool. However, I succesfully captured the 4way Handshake for my target network using the same antenna on my MTK7612U network adapter (the one that I used the most with hcxdumptool) by using the another tools called AngryOxide I know you must heard of this tool because the owner says this tools was inspired by yours (hcxdumptool) So I test using that tool with my same network adapter and the old antenna, same testing spot, same client and same AP distance. I succesfully captured a 4way handshake in about 4-5 minutes as you can see below: So by using the handshake from Angry Oxide, I succesfully cracked the password of my targetted network using hashcat. (Of course its easy to guess since I already know the password pattern) So, I don't know why my router is not vulnerable with hcxdumptool, aircrack-ng, and airgeddon attack, but it is working on Angry Oxide tools and I believe the process is quite similiar with hcxdumptool. When I succesfully captured the handshake using AngryOxide, I run a test with hcxdumptool but still I failed. I did not changed anything such as my workstation, my clients, my AP distance and password. But still I was unable to capture the handshake by using the bpf filter. Im quite confused what is wrong with my hcxdumptool and still figure it out why. |
Beta Was this translation helpful? Give feedback.
-
BTW: This is the price tag of the "user-friendly" real time display:
You might think 3077511 nsec isn't so much, but: This is the elapsed time between received packets (and hcxdumptool must respond between them):
Please make up your own mind how many packets are dropped/unresponsed while processing the real time display, e.g.:
Please note: hcxdumptool can (controlled by the BPF) run head-less (without real time display). |
Beta Was this translation helpful? Give feedback.
-
This type attack can easily cause AP crashes, if the client again attempt |
Beta Was this translation helpful? Give feedback.
-
hcxdumptool very powerful, the is unparalleled tools Create BPF attack one MAC Start capture, in 1 channel target MAC aa:aa:aa:aa:aa:aa If handshake cannot be captured, |
Beta Was this translation helpful? Give feedback.
-
@theweefies
Your snaplen: 262144 (which is the default snaplen of tcpdump and a way too big for our purpose) Now the same filter build by hcxdumptool:
hcxdumptool snaplen: 1024 That's why I don't use something like hard coded user friendly filters. Hcxpcapngtool will throw a warning that important frames has been filtered out. Due to performance reasons, hcxdumptool's snaplen has been reduced to 1024 (which is enough for our purpose): Line 14 in 7c47599 This will not work, too: |
Beta Was this translation helpful? Give feedback.
-
Since version 6.3.2, the style GUI very good (compared old versions the style GUI)
When Ctrl+c stop, pop up target attack sequence number
|
Beta Was this translation helpful? Give feedback.
-
@hyekalhitech |
Beta Was this translation helpful? Give feedback.
-
@hyekalhitech Please also try this and report exit message (Packets received, Packets dropped and elapsed time: |
Beta Was this translation helpful? Give feedback.
-
Hi, Anybody here knows how to perform an attack for the specific network ? Currently I am using this command
sudo hcxdumptool -i wlan0 -w dumpfile.pcapng -F --rds=1
and its been targetting all the nearby network and I don't want that.
I already try something like :
sudo hcxdumptool -i wlan0 -w dumpfile.pcapng -F --rds=1 wlan0 addr1 XX:XX:XX:XX:XX:XX
but still it is targetting all the nearby network.
Please help, a little bit confused for me on this new version of Hcxdumptool, before this I used to use this command for filtering but now its unavailable anymore in the new version
--filterlist=myfilterhere.txt
Beta Was this translation helpful? Give feedback.
All reactions