# hcxdumptool

This tool is awesome for wifi shenanigans.

# Install

git clone https://github.com/ZerBea/hcxdumptool.git ~/hcxdumptool
sudo apt install build-essential git libpcap-dev -y
make -j $(noproc)

# Enumerate nearby wifi

sudo hcxdumptool -i wlan0mon -F --rcascan=active

# Attack just specific channels

sudo hcxdumptool -i wlan0mon -F --rds=1 -c40b,44b -w dump.pcapng

# Basic run to start enumerating/attacking all the wifis

Taking these tips from this issue. This Cyberark blog was also very helpful.

sudo hcxdumptool -i INTERFACENAME -w dumpfile.pcapng --rds=1 -F

# Build a filter list

Check out this issue for a good example. Also check out this discussion.

# Capture away!

# Capture with BPF

hcxdumptool -i NAME-OF-PHYSICAL-WIFI-INTERFACE --bpf=attack.bpf -w output.pcapng --rds=1 -F

# Capture with BPF and specific channels

hcxdumptool -i NAME-OF-PHYSICAL-WIFI-INTERFACE --bpf=attack.bpf -w output.pcapng --rds=1 -F -c 55,23

As the scan runs you'll see a table with heading:

R 1 3 P S
  • R - AP in range or under attack
  • 1 - got EAPOL M1 challenge
  • 3 - got EAPOL M1M2M3 or EAPOL (hashcat/JTR can work with this)
  • P - got PMKID (hashcat/JTR can work with this)
  • S - authentication key management PSK

WPA3 is attacked differently! Check the hcxlabtool page for more information.