Portable solution for capturing wlan traffic and conversion to hashcat formats (recommended by hashcat) and to John the Ripper formats. hcx: h = hash, c = capture, convert and calculate candidates, x = different hashtypes
Branch: master
Clone or download
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
include more ENDIAN fixes Feb 23, 2019
usefulscripts prepare for release 4.2.0 - see changelog for details Aug 1, 2018
.gitignore moved to v 5.1.1 - removed depricated tools Feb 2, 2019
.travis.yml moved to v 5.1.1 - removed depricated tools Feb 2, 2019
Makefile added new tool: hcxwltool (see changelog) Feb 12, 2019
README.md updated hcxpsktool and hcxwltool Feb 12, 2019
changelog moved to v 5.1.2 Feb 18, 2019
com_aes.c wlanhcxcat: Add static keyword + add declatations to common functions Oct 30, 2017
com_formats.c fixed tons og gcc 8.1 warnings May 7, 2018
com_md5_64.c Remove excess whitespace and fix file permissions. Oct 8, 2017
com_md5_64.h wlanhcxcat: Add static keyword + add declatations to common functions Oct 30, 2017
com_wpa.c Add static to the remaining files Oct 31, 2017
common.c let things build with gcc < 4.3 Feb 11, 2019
common.h Add support for OpenBSD Jan 24, 2019
hcxhash2cap.c print error message if no option is selcted Feb 11, 2019
hcxhashcattool.c print error message if no option is selcted Feb 11, 2019
hcxpcaptool.c some cleanups Feb 22, 2019
hcxpsktool.c fixed bug on additional weak candidates output Feb 23, 2019
hcxwltool.c fixed typo Feb 12, 2019
license.txt update license Jan 15, 2019
whoismac.c whoismac: added new options (see help or changelog) Feb 11, 2019
wlancap2wpasec.c removed unneeded code Feb 14, 2019
wlancow2hcxpmk.c Add support for OpenBSD Jan 24, 2019
wlanhashhcx.c Add support for OpenBSD Jan 24, 2019
wlanhc2hcx.c Add support for OpenBSD Jan 24, 2019
wlanhcx2cap.c Add support for OpenBSD Jan 24, 2019
wlanhcx2essid.c Add support for OpenBSD Jan 24, 2019
wlanhcx2john.c Add support for OpenBSD Jan 24, 2019
wlanhcx2psk.c Add support for OpenBSD Jan 24, 2019
wlanhcx2ssid.c Add support for OpenBSD Jan 24, 2019
wlanhcxcat.c Add support for OpenBSD Jan 24, 2019
wlanhcxinfo.c Add support for OpenBSD Jan 24, 2019
wlanhcxmnc.c Add support for OpenBSD Jan 24, 2019
wlanjohn2hcx.c Add support for OpenBSD Jan 24, 2019
wlanpmk2hcx.c Add support for OpenBSD Jan 24, 2019
wlanwkp2hcx.c Add support for OpenBSD Jan 24, 2019

README.md

hcxtools

Small set of tools convert packets from captures (h = hash, c = capture, convert and calculate candidates, x = different hashtypes) for the use with latest hashcat or John the Ripper. The tools are 100% compatible to hashcat and John the Ripper and recommended by hashcat. This branch is pretty closely synced to hashcat git branch (that means: latest hcxtools matching on latest hashcat beta) and John the Ripper git branch ("bleeding-jumbo").

Support for hashcat hash-modes: 2500, 2501, 4800, 5500, 12000, 16100, 16800, 16801

Support for John the Ripper hash-modes: WPAPSK-PMK, PBKDF2-HMAC-SHA1, chap, netntlm, tacacs-plus

After capturing, upload the "uncleaned" cap here (https://wpa-sec.stanev.org/?submit) to see if your ap or the client is vulnerable by using common wordlists. Convert the cap to hccapx and/or to WPA-PMKID-PBKDF2 hashline (16800) and check if wlan-key or plainmasterkey was transmitted unencrypted.

Brief description

Multiple stand-alone binaries - designed to run on Arch Linux.

All of these utils are designed to execute only one specific function.

hcxdumptool moved to: https://github.com/ZerBea/hcxdumptool

Read this post: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats (https://hashcat.net/forum/thread-6661.html)

Detailed description

Tool Description
hcxpcaptool Shows info of pcap/pcapng file and convert it to other hashformats accepted by hashcat and John the Ripper
hcxpsktool Calculates candidates for hashcat and john based on based on hcxpcaptool output (-o, -z- -U) or commandline input
hcxwltool Calculates candidates for hashcat and john based on hcxpcaptool output (-E, -I- -U)
hcxhash2cap Converts hash file (PMKID, EAPOL-hccapx, EAPOL-hccap, WPAPSK-john) to cap
hcxhashcattool Calculate PMKs from hashcat -m 2500 potfile
wlanhc2hcx Converts hccap to hccapx
wlanwkp2hcx Converts wpk (ELMCOMSOFT EWSA projectfile) to hccapx
wlanhcx2essid Merges hccapx containing the same ESSID
wlanhcx2ssid Strips BSSID, ESSID, OUI
wlanhcxinfo Shows detailed info from contents of hccapxfile
wlanhcxmnc Help to calculate hashcat's nonce-error-corrections value on byte number xx of an anonce
wlanhashhcx Generate hashlist from hccapx hashfile (md5_64 hash:mac_ap:mac_sta:essid)
wlanhcxcat Simple password recovery tool for WPA/WPA2/WPA2 SHA256 AES-128-CMAC (hash-modes 2500, 2501)
wlanpmk2hcx Converts plainmasterkey and ESSID for use with hashcat hash-mode 12000 or john PBKDF2-HMAC-SHA1
wlanjohn2hcx Converts john wpapsk hashfiles for use with hashcat hash-modes 2500, 2501
wlancow2hcxpmk Converts pre-computed cowpatty hashfiles for use with hashcat hash-mode 2501
wlanhcx2john Converts hccapx to format expected by John the Ripper
wlancap2wpasec Upload multiple caps to https://wpa-sec.stanev.org
whoismac Show vendor information and/or download oui reference list

Compile

Simply run:

make
make install (as super user)

Requirements

  • Linux (recommended Arch Linux, but other distros should work, too (no support for other distributions).

  • libopenssl and openssl-dev installed

  • librt and librt-dev installed (should be installed by default)

  • zlib and zlib-dev installed (for gzip compressed cap/pcap/pcapng files)

  • libcurl and curl-dev installed (used by whoismac and wlancap2wpasec)

  • libpthread and pthread-dev installed (used by hcxhashcattool)

To install requirements on Kali use the following 'apt-get install libcurl4-openssl-dev libssl-dev zlib1g-dev'

Useful scripts

Script Description
piwritecard Example script to restore SD-Card
piwreadcard Example script to backup SD-Card

Notice

Most output files will be appended to existing files (with the exception of .cap files).

Bitmask message pair field (hcxpcaptool)

0: MP info (https://hashcat.net/wiki/doku.php?id=hccapx#message_pair_table)

1: MP info (https://hashcat.net/wiki/doku.php?id=hccapx#message_pair_table)

2: MP info (https://hashcat.net/wiki/doku.php?id=hccapx#message_pair_table)

3: x unused

4: ap-less attack (set to 1) - no nonce-error-corrections neccessary

5: LE router detected (set to 1) - nonce-error-corrections only for LE neccessary

6: BE router detected (set to 1) - nonce-error-corrections only for BE neccessary

7: not replaycount checked (set to 1) - replaycount not checked, nonce-error-corrections definitely neccessary