0% found this document useful (0 votes)
13 views

message

Uploaded by

ssdadasdasdsfdf
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

message

Uploaded by

ssdadasdasdsfdf
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

root@fk8:/home/fk8# hcxpcapngtool -o ts3.hccapx ts-03.

cap
hcxpcapngtool 6.2.7 reading from ts-03.cap...

summary capture file


--------------------
file name................................: ts-03.cap
version (pcap/cap).......................: 2.4 (very basic format without any
additional information)
timestamp minimum (GMT)..................: 31.10.2024 07:59:03
timestamp maximum (GMT)..................: 31.10.2024 08:01:41
used capture interfaces..................: 1
link layer header type...................: DLT_IEEE802_11 (105) very basic format
without any additional information about the quality
endianness (capture system)...............: little endian
packets inside...........................: 5780
ESSID (total unique).....................: 1
BEACON (total)...........................: 1
BEACON on 2.4 GHz channel (from IE_TAG)..: 6
ACTION (total)...........................: 15
PROBEREQUEST (directed)..................: 2
PROBERESPONSE (total)....................: 408
DEAUTHENTICATION (total).................: 2574
AUTHENTICATION (total)...................: 6
AUTHENTICATION (OPEN SYSTEM).............: 6
ASSOCIATIONREQUEST (total)...............: 2
ASSOCIATIONREQUEST (PSK).................: 2
WPA encrypted............................: 1368
EAPOL messages (total)...................: 48
EAPOL RSN messages.......................: 48
EAPOLTIME gap (measured maximum usec)....: 8538364
EAPOL ANONCE error corrections (NC)......: not detected
REPLAYCOUNT gap (measured maximum).......: 3
EAPOL M1 messages (total)................: 45
EAPOL M2 messages (total)................: 1
EAPOL M3 messages (total)................: 1
EAPOL M4 messages (total)................: 1
EAPOL pairs (total)......................: 2
EAPOL pairs (best).......................: 1
EAPOL pairs written to 22000 hash file...: 1 (RC checked)
EAPOL M32E2 (authorized).................: 1

frequency statistics from radiotap header (frequency: received packets)


-----------------------------------------------------------------------
not available due to missing radiotap header

Warning: too many deauthentication/disassociation frames detected!


That can cause that an ACCESS POINT change channel, reset EAPOL TIMER,
renew ANONCE and set PMKID to zero.
This could prevent to calculate a valid EAPOL MESSAGE PAIR
or to get a valid PMKID.

Information: limited dump file format detected!


This file format is a very basic format to save captured network data.
It is recommended to use PCAP Next Generation dump file format (or pcapng for
short) instead.
The PCAP Next Generation dump file format is an attempt to overcome the limitations
of the currently widely used (but limited) libpcap (cap, pcap) format.
https://www.wireshark.org/docs/wsug_html_chunked/
AppFiles.html#ChAppFilesCaptureFilesSection
https://github.com/pcapng/pcapng

Information: radiotap header is missing!


Radiotap is a de facto standard for 802.11 frame injection and reception.
The radiotap header format is a mechanism to supply additional information about
frames,
from the driver to userspace applications.
https://www.radiotap.org/

Information: missing frames!


This dump file does not contain undirected proberequest frames.
An undirected proberequest may contain information about the PSK.
It always happens if the capture file was cleaned or
it could happen if filter options are used during capturing.
That makes it hard to recover the PSK.

session summary
---------------
processed cap files...................: 1

root@fk8:/home/fk8# hashcat -m 22000 -a 0 ts3.hccapx


/home/fk8/Downloads/wordlist.txt
hashcat (v6.2.6) starting

Successfully initialized the NVIDIA main driver CUDA runtime library.

Failed to initialize NVIDIA RTC library.

* Device #1: CUDA SDK Toolkit not installed or incorrectly installed.


CUDA SDK Toolkit required for proper device support and utilization.
Falling back to OpenCL runtime.

* Device #1: WARNING! Kernel exec timeout is not disabled.


This may cause "CL_OUT_OF_RESOURCES" or related errors.
To disable the timeout, see: https://hashcat.net/q/timeoutpatch
OpenCL API (OpenCL 3.0 CUDA 12.4.131) - Platform #1 [NVIDIA Corporation]
========================================================================
* Device #1: NVIDIA GeForce RTX 2060, 5440/5915 MB (1478 MB allocatable), 30MCU

Minimum password length supported by kernel: 8


Maximum password length supported by kernel: 63

Hashes: 1 digests; 1 unique digests, 1 unique salts


Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1

Optimizers applied:
* Zero-Byte
* Single-Hash
* Single-Salt
* Slow-Hash-SIMD-LOOP

Watchdog: Temperature abort trigger set to 90c

Host memory required for this attack: 1317 MB

Dictionary cache built:


* Filename..: /home/fk8/Downloads/wordlist.txt
* Passwords.: 100000001
* Bytes.....: 900000009
* Keyspace..: 100000001
* Runtime...: 5 secs

Cracking performance lower than expected?

* Append -w 3 to the commandline.


This can cause your screen to lag.

* Append -S to the commandline.


This has a drastic speed impact but can be better for specific attacks.
Typical scenarios are a small wordlist but a large ruleset.

* Update your backend API runtime / driver the right way:


https://hashcat.net/faq/wrongdriver

* Create more work items to make use of your parallelization power:


https://hashcat.net/faq/morework

[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit => b

Next dictionary / mask in queue selected. Bypassing current one.

Session..........: hashcat
Status...........: Bypass
Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL)
Hash.Target......: ts3.hccapx
Time.Started.....: Thu Oct 31 08:02:04 2024 (19 secs)
Time.Estimated...: Thu Oct 31 08:10:21 2024 (7 mins, 58 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (/home/fk8/Downloads/wordlist.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 201.0 kH/s (4.64ms) @ Accel:4 Loops:256 Thr:256 Vec:1
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)
Progress.........: 3778560/100000001 (3.78%)
Rejected.........: 0/3778560 (0.00%)
Restore.Point....: 3778560/100000001 (3.78%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: 03778560 -> 03809279
Hardware.Mon.#1..: Temp: 54c Fan: 54% Util: 48% Core:1875MHz Mem:6801MHz Bus:16

Started: Thu Oct 31 08:01:57 2024


Stopped: Thu Oct 31 08:02:24 2024

You might also like