Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Extract PSK candidates from captures #42

Open
RealEnder opened this issue Oct 23, 2018 · 1 comment
Open

Extract PSK candidates from captures #42

RealEnder opened this issue Oct 23, 2018 · 1 comment
Assignees

Comments

@RealEnder
Copy link
Owner

hcxpcaptool -E -U -I and try those before returning work to the client

@RealEnder RealEnder self-assigned this Oct 23, 2018
@ZerBea
Copy link

ZerBea commented Jan 12, 2021

Great idea. Many, many PSKs can be found in the traffic.
A good idea would be:

hcxpcapngtool -E -I-U to get all possible candidates
hcxeiutool -s on hcxpcapngtool -E -I -U output to get a list with raw candidates and add to the list
send list from hcxeiutool -s and rules (luc: + 0-99, 1950-2011) to python client (help_crack.py) and  let him do the work load

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants