Information for RPM hcxtools-6.3.2-1.ocs23.src.rpm
ID | 139626 | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Name | hcxtools | ||||||||||||
Version | 6.3.2 | ||||||||||||
Release | 1.ocs23 | ||||||||||||
Epoch | |||||||||||||
Arch | src | ||||||||||||
Summary | Portable solution for conversion WiFi dump files to hashcat formats | ||||||||||||
Description | Small set of tools convert packets from captures (h = hash, c = capture, convert and calculate candidates, x = different hashtypes) for the use with latest hashcat or John the Ripper. The tools are 100% compatible to hashcat and John the Ripper and recommended by hashcat. This branch is pretty closely synced to hashcat git and John the Ripper git. Support of hashcat hash-modes: 4800, 5500, 2200x, 16100, 250x (deprecated), 1680x (deprecated) Support of John the Ripper hash-modes: WPAPSK-PMK, PBKDF2-HMAC-SHA1, chap, netntlm, tacacs-plus Support of gzip (.gz) single file compression. Main purpose is to detect weak points within own WiFi networks by analyzing the hashes. Therefore convert the dump file to WPA-PBKDF2-PMKID+EAPOL hash file and check if wlan-key or plainmasterkey was transmitted unencrypted. Or upload the "uncleaned" dump file (pcapng, pcap, cap) here https://wpa-sec.stanev.org/?submit to find out if your ap or the client is vulnerable by using common wordlists or a weak password generation algorithm. | ||||||||||||
Build Time | 2024-07-22 04:09:34 GMT | ||||||||||||
Size | 159.43 KB | ||||||||||||
f06211c75dd7da4868ecbc60981a0677 | |||||||||||||
License | MIT | ||||||||||||
Buildroot | dist-ocs23-epol9-build-214498-15910 | ||||||||||||
Provides |
|
||||||||||||
Obsoletes | No Obsoletes | ||||||||||||
Conflicts | No Conflicts | ||||||||||||
Requires |
|
||||||||||||
Recommends | No Recommends | ||||||||||||
Suggests | No Suggests | ||||||||||||
Supplements | No Supplements | ||||||||||||
Enhances | No Enhances | ||||||||||||
Files |
|
||||||||||||
Component of | No Buildroots |