Skip to content

Crystal utility to automate PMKID capture via HCXDUMPTOOLS

Notifications You must be signed in to change notification settings

XORMANCER/WHITECAT

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 

Repository files navigation

image
🔮 Crystal utility to automate the capture of an 802.11 PMKID

📝 Installation

Install the crystal programming language.

For kali linux (debian) users, the following command will install crystal.

curl -fsSL https://crystal-lang.org/install.sh | sudo bash

Next, run the following commands to build main.cr and execute the setup file.

sudo crystal build --release main.cr -o whitecat
sudo chmod +x setup.sh
sudo ./setup.sh

The compiled binary will be moved to /usr/bin/whitecat
All configuration files are located within /usr/share/WHITECAT

:octocat: Usage

sudo whitecat

If a target AP supports PMKID authentication, attempting to connect with an improper password will force a PMKID frame to populate. This can theoretically allow clientless WPA2 authentication, as only an attempted connection is required.

For more information, please visit the original forum explaining the attack HERE

License

MIT

About

Crystal utility to automate PMKID capture via HCXDUMPTOOLS

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published