Thats dead in the water Mate....... reading from nws-01.cap... summary capture file -------------------- file name................................: nws-01.cap version (pcap/cap).......................: 2.4 (very basic format without any additional information) timestamp minimum (GMT)..................: 14.01.2022 00:36:51 timestamp maximum (GMT)..................: 14.01.2022 00:41:20 used capture interfaces..................: 1 link layer header type...................: DLT_IEEE802_11 (105) endianess (capture system)...............: little endian packets inside...........................: 578 BEACON (total)...........................: 9 PROBEREQUEST.............................: 4 PROBERESPONSE............................: 107 WPA encrypted............................: 10 EAPOL messages (total)...................: 121 EAPOL RSN messages.......................: 121 ESSID (total unique).....................: 11 EAPOL M1 messages (total)................: 121 PMKID (useless)..........................: 121 Warning: out of sequence timestamps! This dump file contains frames with out of sequence timestamps. It is a bug of the capturing tool. Warning: missing frames! This dump file contains no important frames like authentication, association or reassociation. It always happens if the capture file was cleaned or it could happen if filter options are used during capturing. That makes it hard to recover the PSK. # BSSID ESSID Encryption 1 00:1C:7B:F5:6B:7D NetMASTER Uydunet-B134 Unknown 2 18:48:59:0A:4F:80 TURKSAT-KABLONET-282B-2.4G Unknown 3 18:48:59:17:0B:CE Kablonet Netmaster-A337-G Unknown 4 18:48:59:17:0B:CF Kablonet Netmaster-A337-A Unknown 5 18:48:59:17E:8B Unknown 6 5C:63:BF9:E9:A9 TurkTelekom_T07E5 Unknown 7 90:6F:18:A2:72:15 Thom_D0050724 Unknown 8 9C:691:553:68 VodafoneNet-7BEPKH WPA (0 handshake) 9 9C:9D:7E:24:08:FC Husserl Unknown 10 FC:4A:E9:16E:27 NetMASTER Uydunet-DE24 WPA (0 handshake) 11 FC:4A:E9:45:18:07 NetMASTER Uydunet-1804 WPA (0 handshake) https://www.hackingarticles.in/wireless-penetration-testing-wifite/ https://www.hackingarticles.in/wireless-penetration-testing-pmkid-attack/
@longshanks dude. This AP does not connect to any client. How can I get PMKID without client. Even Bettercap didn't call for work... Thanks...
You don't need a client to get a pmkid. https://www.nomotion.net/blog/cracking-wifi-without-clients-pmkid-method/ But remember, that not all modems are pervious to that attack. The easiest way is install these tools. git clone https://github.com/ZerBea/hcxtools git clone https://github.com/ZerBea/hcxdumptool cd hcxdumptool make sudo make install cd ../hcxtools make sudo make install hcxdumptool -i wlan0mon -o hcxdump.pcapng --enable_status=1 Or use wifite........... wifite --pmkid
Is this modem protected? PMKID is not captured somehow! https://www.epey.com/modem/huawei-hg531s-v1.html
i'm not new here and i know that is many pros here , so it will not take time to convert the cap files , and yes location in egypt but i'm not living there exactly . so if u can solve it . i will be thankful
I shook hands. Help HASH: WPA*02*20f4061d7be7fa783093fe3c5598ea76*9c69d155d368*e01283028467*566f6461666f6e654e65742d374245504b48*f19441f07d26bd5623870797869 61e2292d8f56e92e462d390efad54e81279e2*0103007502010a00000000000000000001460efb646dcfd557d7d02662eea60bef38d2a0bee3337d23d66e87e122 922fe2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001630140100000fac020100000f ac040100000fac020000*c2
Hi im trying to crack this one about 3 weeks but i failed. I have tried rockyou and spesific wordlists.. Can you help me please? ( I make 3 parts because cap file is 21 MB sorry that )