Jump to content

Search the Community

Showing results for tags 'pmkid'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 3 results

  1. PMKID Attack WPA/WPA2 on WiFi Pineapples! Pineapple NANO + TETRA WARNING! This attack is EXTREMELY effective on the Pineapples! And is capable of capturing an entire neighborhood of PMKID's in a minute or less, even without access-points! ONLY use hcxdumptool on networks and devices you have expressive permission to, because of this: hcxdumptool is able to prevent complete wlan traffic! hcxdumptool is able to capture PMKID's from access points (only one single PMKID from an access point is required!) hcxdumptool is able to capture handshakes from not conn
  2. The HCX Pi is based off ZerBea's hcxdumptool project: https://github.com/ZerBea/hcxdumptool Specs: Raspberry Pi 3B+ running Arch Linux Alfa AWUS036NH adapter Custom board for multiple status LEDs and control button 3D printed enclosure. The purpose of the hardware is to have a small self-contained portable tool for capturing WPA2 PMKIDs The hardware could easily be repurposed for many other applications as well (more coming soon!). LEDs are for power, ACT for Pi, and hcxdumptool status LED based off the script from github project. If th
  3. Name: PMKIDAttackAuthor: n3d.b0yPlatform: Tetra / NANOVersion: 1.2GitHub: https://github.com/n3d-b0y/PMKIDAttackDescription: This module makes it easy to capture PMKID. We scan the network, click the attack button opposite the attacked access point and wait for the result. After we receive PMKID, attacks it will automatically stop and the file with hashes will go to the Captured block where you can download it. Module installation for Tetra: opkg update && opkg install git git-http cd /pineapple/modules/ git clone https://github.com/n3d-b0y/PMKIDAttack.g
×
×
  • Create New...