Replies: 13 comments 12 replies
-
First of all, this is not an issue, so I'm going to move it to discussions. Looks like you BPF is not working as expected. The mac 802.11 header (hcxdumptool is working on) looks like this: to addr1 - from addr2 - BSSID addr3 let's say: to attack this three APs and to allow broadcast frames use this filter: It is not useful to code a BPF using a CLIENT address, because nearly all state of the art CLIENTs are running MAC randomization! I use this kind of BPF (more or less advanced than described above) when testing a new driver/adapter: It is also a good idea to add the operating frequency/channel to hcxdumptools command line instead off scanning the entire frequency range. BTW: |
Beta Was this translation helpful? Give feedback.
-
Hello, First thank you SO much for your fast help. I was really misunderstanding BPF creation. Now that I'm back at the computer, I checked the
Does that change the BPF since the |
Beta Was this translation helpful? Give feedback.
-
I read this thread (excellent!) and it seems like the "all in one" way to capture the right BPF in this case is something like:
I did create the filter this way and ran hcxdumptool again and the result is the same - only |
Beta Was this translation helpful? Give feedback.
-
Three problems: This filter "wlan addr3 ffffffffffff or wlan addr3 111111111111 or wlan addr3 222222222222 or wlan addr3 333333333333 or wlan addr1 aaaaaaaaaaaa or wlan addr2 aaaaaaaaaaaa" attacks 3 different APs and one CLIENT! Important note: Óscar Alfonso Díaz (the thread you mentioned) is the author of airgeddon. |
Beta Was this translation helpful? Give feedback.
-
Thanks both of you. I should've been clear that when I did try the tcpdump BPF build, I used the native interface and not a virtual one. Upon further enumeration of the air space, I'm finding several MAC-AP broadcasting the networks I need, but it's the same as I shared earlier, where one MAC broadcasts all 3 networks in scope. So I followed the BPF build you shared in the first reply (so that I can attack them all):
What I see on my screen for MACs and network names:
So I think all three MACs are being enumerated/attacked, but my remaining question is...will this configuration eventually allow me to capture handshakes/PMKIDS for all in-scope networks that are being broadcast from these three devices? What I'm doing in another window to check what's being captured is periodically run Thanks for your help/patience with this. I've been trying to read all the content/discussions but it seems like there are a lot of outdated posts out there with the tool flags and other things changing over the years. My end goal is to make a blog post that is kind of a quick start for using these tools to narrow your scope, grab handshakes/PMKIDs, convert as necessary, and crack with hashcat. Will certainly share when finished! |
Beta Was this translation helpful? Give feedback.
-
"I used the native interface and not a virtual one." iw is used to set monitor mode:
I'm sure you see the difference.
"So I think all three MACs are being enumerated/attacked, but my remaining question is...will this configuration eventually allow me to capture handshakes/PMKIDS for all in-scope networks that are being broadcast from these three devices?" To build a "working" filter it is mandatory to understand 802.11 addressing (addr1, addr2 and add3) and it is mandatory to understand the BPF (capture filter used by Wireshark, tshark and tcpdump too). |
Beta Was this translation helpful? Give feedback.
-
Thanks I think the filters make much more sense now. Let me try this new filter and I'll report back! |
Beta Was this translation helpful? Give feedback.
-
Arrrgggghhh, major user "DOHP!" on my part. Of the network names broadcasted by these APs, two of them are WPA3 SAE! My understanding from this thread and this one and other research is that there is not a direct path to capture/crack a handshake. Discussion 468 mentions using hcxdumptool to test if downgrade is possible but I don't see other posts on how to do this? Looks as if I may be able to check for this via wireshark as well. |
Beta Was this translation helpful? Give feedback.
-
Do not set a BPF, because the CLIENT probably uses MAC randomization and hcxlabtool/hcxdumptool responds to its undirected BROADCAST PROBEREQUESTs using a randomized MAC, too. A strict BPF filter prevents this! Also it is useful to increase the stay time on a frequency to >= 15 seconds. Use only 2.4GHz band! 5,6,7 GHz CLIENTs will connect to hcxlabtool/hcxdumptool on 2.4GHz! This attack is called AP-LESS attack. Depending on the conditions, it might take some time. |
Beta Was this translation helpful? Give feedback.
-
Oh cool! Ok so I'll try this tomorrow when I'm back on the test. Looks like options to use are |
Beta Was this translation helpful? Give feedback.
-
I think it's working! I got excited and remoted in to the network to try this on a test. The command I posted above worked and I started seeing tons of other networks - but not the ones in scope as they are on another band. The screen was looking like this:
And then after a while, at the very bottom there popped a line like this - without a
Then I ran hcxpcapngtool to make a .hc22000 file, then hcxhashtool to look at everything inside, I have an entry!
All that said, questions:
Thanks so much this is super educational and interesting! |
Beta Was this translation helpful? Give feedback.
-
ZerBea, can't continue to thank you enough. Admittedly I do NOT have the knowledge pre-reqs to be using your tools and wireless pentesting is usually done by other folks on my team, but I really appreciate you helping me along the way and figuring out the BPF and how to do a WPA3 test. I think your last responses all make sense and I'm off to go crack these handshakes. I think last question just so I make sure I'm recommending proper recommendations for the client: if they set their wireless gear to "WPA3 Only" and not allow WPA2, then:
Do I have that right? |
Beta Was this translation helpful? Give feedback.
-
Fantastic thanks a million again! I'll close the conversation but will likely add an additional comment when I publish some quick start tips for these amazing tools! |
Beta Was this translation helpful? Give feedback.
-
Hello,
I'm on a pentest where the client has 3 APs that are broadcasting 3 networks I want to capture PMKIDs or handshakes for. I've used hcxdumptool in scan mode to find the hardware addresses needed to build a BPF. The building of the BPF is successful, and launching hcxdumptool with the BPF is successful. But then I only see one of the networks and it is never attacked.
Normally I'd think this is a problem on my end, but if I run the tool "wide open" it will see these networks (and many more) and I can see the PMKID capture is successful on some of the in-scope networks.
I could just let the tool run "wide open" until getting all the networks I need but I'm trying to stay in scope and be responsible with my methodology. Plus, unless I'm mistaken there isn't an easy way to pull out PMKIDs/handshakes for just specific network names out of a large capture file?
Thanks,
Brian
Beta Was this translation helpful? Give feedback.
All reactions