如何从 airodumnp-ng .cap 文件中以纯文本形式获取 PSK 哈希?
例子 :
哈希:af8cfcf3c66d6e279d3fcb43e78569e872446e24f5f190350637fa174d9ece63
我了解aircrack-ng -J file.hccap file2.cap生成 .hccap (格式 hashcat 可以使用)但有其他哈希,而不是 PSK 哈希。
这是我的路由器 hccap 文件:
Opening clean.cap
Read 3 packets.
# BSSID ESSID Encryption
1 5C:D9:98:E5:AD:D8 me WPA (1 handshake)
Choosing first network as target.
Opening clean.cap
Reading packets, please wait...
Building Hashcat (1.00) file...
[*] ESSID (length: 2): me
[*] Key version: 2
[*] BSSID: 5C:D9:98:E5:AD:D8
[*] STA: 48:86:E8:1A:B5:B0
[*] anonce:
80 BB D8 30 3C 77 67 69 05 C0 9E 1D E2 1F B9 78
77 E2 91 83 02 BA FB AA E3 53 45 D8 C7 60 EC 12
[*] snonce:
6F 82 D4 AE D5 D3 9C D8 5D 43 CB 2E 9D D1 56 1A
F7 20 F0 43 89 FB 48 69 37 7E 12 9D 65 B4 3B B7
[*] Key MIC:
A9 80 58 2B 77 E0 50 6B CF 7C 14 42 23 55 AD 2A
[*] eapol:
01 03 00 75 02 01 0A 00 00 00 00 00 00 00 00 00
01 6F 82 D4 AE D5 D3 9C D8 5D 43 CB 2E 9D D1 56
1A F7 20 F0 43 89 FB 48 69 37 7E 12 9D 65 B4 3B
B7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 16 30 14 01 00 00 0F AC 02 01 00 00 0F AC
04 01 00 00 0F AC 02 00 00
Successfully written to myRouterClean.hccap
Quitting aircrack-ng...
因为是我自己的路由器,所以我知道我的 PSK 是:
9b3fdc780db2bbf3045eff878f10a55b0e2c0eb1088df8dad0d6dc130f2d51fd
如何从上述文件 (hccap) 或 airodump-ng 输出 .cap 文件中提取我的 PSK?
john 还需要处理捕获文件才能使用它,这是hccap2john的输出,仍然不好:(
e:$WPAPSK$me#LBaMtOrMG6Pc4fKkPs9IfhLHbBVREwgibR3K4jQUw2C7yoVdBrsGbKKoCvS.ixUkD
5RbOEL.bVrW5vZsRy8FUk8uyufXIoLMlq1g2U21.5I0.Ec............/Ps9IfhLHbBVREwgibR3
K4jQUw2C7yoVdBrsGbKKoCvQ......................................................
...........3X.I.E..1uk0.E..1uk2.E..1uk0.......................................
..............................................................................
.................................................................
/t.....U...8a.K0hrs3/fnrkIEWBJfGc:48-86-e8-1a-b5-b0:5c-d9-98-e5-ad-
d8:5cd998e5add8::WPA2:myRouterClean.hccap