ZerBea / hcxdumptool

Small tool to capture packets from wlan devices.
MIT License
1.85k stars 398 forks source link

More Documentation Changes #460

Closed Jake-Grafton closed 5 months ago

Jake-Grafton commented 5 months ago

These commits match the style of the end of the README with it's beginning. It also fixes a few errors and offloads the PCAPNG Option Codes section to it's own document in the /docs/ folder. The new GPS device listed is the GPS unit I use and it seems to work well.

ZerBea commented 5 months ago

Good idea, thanks. Merged

Jake-Grafton commented 5 months ago

@ZerBea What do you think about me writing a document that showcases an attack on an access point along with the cracking of it's PSK? Would this walkthrough be too much or do you think it's a good idea?

ZerBea commented 5 months ago

First part (a layer 2 attack on an access point) is fine, but please keep in mind that there is no comprehensive solution (that is the reason why hcxdumptool/hcxtools offer so many options).

Second part (cracking of a PSK) is hascat/JtR playground (it should be be reported/explained there), but please keep in mind that there is no comprehensive solution (that is the reason why the GPU crackers offer so many attack modes). https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2 https://www.openwall.com/john/doc/EXAMPLES.shtml