Apologies for the glitches in this video 😢 .... looks like the export of this video broke.... I had lots of issues uploading the original video to UA-cam and had to export again quickly and it looks like something else broke. Hopefully won't happen again 😅 Big thanks to Cisco Meraki for sponsoring this video! Learn how to secure hybrid networks so you can stop these kinds of attacks: davidbombal.wiki/meraki Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Only use the tools demonstrated in this video on networks you have permission to attack. // MENU // 0:00 ▶ Introduction 1:32 ▶ Software used 2:17 ▶ WiFi Hardware used 3:15 ▶ Commands used 4:17 ▶ Install required software method 1 5:31 ▶ Install using Github 7:20 ▶ hcxdumptool demo using first Alfa adapter 9:15 ▶ Demonstration using second Alfa adapter 11:15 ▶ Real world example - a warning to all of us 13:45 ▶ Use hcxpcapngtool to set format correctly 17:24 ▶ Using hashcat with rockyou wordlist 18:38 ▶ Using hashcat with GPU and bruteforce // Previous Videos // Kali Wifi Adapters: ua-cam.com/video/5MOsY3VNLK8/v-deo.html Old method using airmon-ng: ua-cam.com/video/WfYxrLaqlN8/v-deo.html Old method using GPUs: ua-cam.com/video/J8A8rKFZW-M/v-deo.html // COMMANDS // sudo systemctl stop NetworkManager.service sudo systemctl stop wpa_supplicant.service sudo hcxdumptool -i wlan0 -o dumpfile.pcapng --active_beacon --enable_status=15 sudo systemctl start wpa_supplicant.service sudo systemctl start NetworkManager.service hcxpcapngtool -o hash.hc22000 -E essidlist dumpfile.pcapng hashcat -m 22000 hash.hc22000 wordlist.txt Windows: hashcat.exe -m 22000 hash.hc22000 -a 3 ?d?d?d?d?d?d?d?d hashcat.exe -m 22000 hash.hc22000 -a 3 --increment --increment-min 8 --increment-max 18 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d // SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal UA-cam: ua-cam.com/users/davidbombal // MY STUFF // Monitor: amzn.to/3yyF74Y More stuff: www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
David, I took your CCNA course on Udemy two years ago. Got my CCNA cert, did some security later on following your channel and others. I'm now got a job as a SOC analyst and I'm aiming at becoming a read teamer later on. You helped me get on track with this career. Thank you and keep up the amazing work!
Hii Sir I am Getting this errer "driver is not cfg80211 based and not useable" while running the command "sudo hcxdumptool -i wlan1 -o dumpfile.pcapng --active_beacon --enable_status=15"
Hii Sir I am Getting this errer "driver is not cfg80211 based and not useable" while running the command "sudo hcxdumptool -i wlan1 -o dumpfile.pcapng --active_beacon --enable_status=15"
-o Option is Deprecated so use -w to get output file --active_beacon is also deprecated so use --beacontx=10 --enable_status is also not acceptable now, so I removed it Final Command sudo hcxdumptool -I wlan0 -w dumpfile.pcapng --beacontx=10
Very good and complete explanation of hashcat. Better approach to collecting hashes this way then the classic disconnecting the client from the AP. Quite interested to see the next video with a bigger GPU or multiple GPUs or maybe even try to explain GPU clusters with Hashtopolis. Thanks!
Hii Sir I am Getting this errer "driver is not cfg80211 based and not useable" while running the command "sudo hcxdumptool -i wlan1 -o dumpfile.pcapng --active_beacon --enable_status=15"
Hi David, just to be sure at 8:23 u are showing list of cmds and there is --enable_status=1, but u're using --enable_status=15 in CLI, should we keep 1 or go with 15 (this is probably a typo)
@@ahmadkhalidhotak4348 geez man, chill out. I’m sure he has to read through hundreds of comments at a time and probably responds to the ones that he connects with and relates to most. Maybe make your comments better?
Hi David, at 8:44 when using the comand: "sudo hcxdumptool -i wlan0 -o dumpfile.pcapng --active_beacon --enable_status=15", do I stop the terminal or do I let it continue? After a couple of minutes it doesn't make any progress really andif I try to stop it I simply can't use ^C, nothing happens at all, if I close the terminal and open a new one any command I write connectivity related as, I believe, the wifi stops working, checking it, it says "NetworkManager is not running...", any advice?
I'm blessed by your work Sir. Your free unconditional teaching and knowledge you gave us has immensely rooted with in us. Seeing you new work every weeks gives me a desire that I want to learn ethical hacking and free myself.
Just awesome. It works without any error in Kali Linux. But In windows it taking more time from hash software so I quit it. The adaptor which was showing at video. Already bought in one year ago I feel lucky to having this adaptor which is future on David Bombal channel. Thank you for the video.
Great learning tutorial David. Did you ever do a video using a higher end GPU for doing more complex passwords that are using alpha-numeric as mentioned at 12:55 ? I would like to see how that scenario performs using this method.
Excellent Video. I was able to recover passwords using your methods. I have an NVIDIA 3090 card, it is 5 times faster then a 1650 card. Still took two hours to recover a 10 numbered password however. Looking forward to your next video.
David this video helped me a lot during a pentest with a client that uses a mesh WiFi network where airodump-ng doesn't worked as spected becuse every time i used a deauth attack, the device reconnect on a different access point and i was unable to get the handshake. Thanks a lot!!
Sir , I find only your videos much more convenient, useful , friendly with smooth English and simple explanation about the ethical hacking and so on topics . Thank you very much for teaching us so much amazing things !!
please help at 8:29 when entering the command hcxdumptool says invalid option -- 'o' edit: replace o with w, but a new error comes up saying --active_beacon is not recognized
Hello David, can you please make a new video about the new and re-written hcxdumptool 6.3.x? Can you also show how to connect hashcat to another PC so they can work together with the Brain feature? Please please please 🙏🙏🙏🙏🙏🙏
I did the updates to hcxdumptool after running into issues with the 2200x hashes while doing a hashcat module on HackTheBox that required us to convert a pcap file. However, I had NO IDEA why the old hashes were depreciated. This is awesome! I hated all the things that needed to "line-up" previously to have a shot at cracking WPA2. It's so much easier to just dump the hashes into my hashcat rig haha
Cisco I favour the willingness in sponsorship in content promotion in the spectrum shown here. I further liked to express thanks for sparking and fanning a flame thus leading to minds; possibly being intrigued then pursuing Sec+ filling voids. More essential minds able to elaborate what " online & privacy / security " means
I have enjoyed your videos, they are very well structured and give great step by step instruction. I love to hack but watching your videos now I want to learn so much more! Thank you for your time!
Thanks David. I deleted my previous comment as I wasn't paying attention! It's handy splitting the sniffing and cracking between Kali and Windows, I can put the VM on my laptop and remote to my gaming rig at home to crack. Perfect. Really good video, the adapter is coming tomorrow and I'm looking forward to playing!
@David Bombal Hello, If you leave the hcxdumptool running for a very long time in the same location(stationary/not walking around) it will it collect more/better information ? or after a few minutes will it have collected everything it possibly can ? or is it dependant on network activity ? CHeers very much
I did that tonight. I had some errors, but I found a way out. Well, the worldlist is your weapon. A big plus is that you can put your laptop in wifi scanning, take your laptop, and go around the block to find more essids and afterwards crack them all at once. The bigger the worldlist, the better 😅
Btw, Ctr + Shift + V/C can be used for copy and paste on Linux machines. I see everyone manually copying and posting in these videos, so I thought I'd give a helping hand by potentially reducing the amount of work you have to do in order to do simple things like copy and paste. Also, it's worth mentioning that you can edit your nano config file to work like vim without annoying issues like saving and exiting file edits. With a little bash scripting, you can have nano working similar to vscode, or vim, if you'd like. The nano config file is located at /etc/.nanorc/. You can edit this file via sudo nano /etc/.nanorc/
Thank you for your Udemy Wireshark course and general for everything you have done towards IT knowledge .I hope i meet you somewhere in the Uk and get you a pint mate thanks.Ps I'm from Brum Jarek
Thank you respected sir for your video. May I ask you two questions : - why you have to close two services before initiating the scan? Is it because you didn't want to have other packet exchanges when scan is running? - why did you used external wifi adapter. Why didn't you used built-in laptop wifi adapter? Thank you in advance.
1) Running network services during the scan can cause packet interferences. 2) the external network card supports monitor mode and packets injection, which is required to capture the pcapng file
Incredibly informative video! I noticed some of your hcxdumptool commands are now out of date for version 6.3.1. Do you have an updated video for the new version? Love your channel!
Hi David thanks for guiding me trough hascat and keeping me up to date (as always) Can you make a video about Beef next like netzorkchuck? But with port forwarding? Would be wonderful! Best teacher ever, never leave us please💕🔥
Hi David, when I run the hcxdumptool on kali the whole OS freezes and I end up restarting... are you aware of this issue? do you have any ideas on how I can move forward?
Just want to say thank you for all your videos, another great one David, you present it in an easily understandable format - hats off. What virtualization software (or is a cloud based instance) do you use from your Mac and is there a certain version of Kali Linux that you use if you don't mind answering while I wait for part two as it were with bigger GPU or multiple GPUs?
Hii Sir I am Getting this errer "driver is not cfg80211 based and not useable" while running the command "sudo hcxdumptool -i wlan1 -o dumpfile.pcapng --active_beacon --enable_status=15"
@davidbombal Hi David, I have been following you for a while now and may I say what a wonderful job you are doing. Your content is top quality and easy for beginners to understand and grasp the fundamentals behind every topic you bring to us. I have a question David. I know I could probably Google it and find the answer but I would like help from my favourite online teacher 😁 Question: So with the old method of capturing the hash file we needed to put the network card in monitor mode. In your video I did not see you put the card into monitor mode? So with this new method as long as you have the required network card you don't need to put it in monitor mode! Is that right ? Thanks in advance 🎉
can you make a new and updated video on this topic and maybe using a simpler method? Earlier all we had to do was to convert the .cap file to hccapx and then feed it to hashcat using "-m 2500", but since that is deprecated, isn't there a similar straight forward way to do so?
Can we use the .cap file from wifite and convert it to .hc22000 using the same hcxpcapng tool? Or does the hcxpcapng tool work only with .pcapng files and not .pcap files?
Great video. Couldn't have come at a better time, iv been stuck on hashcat lately and wondered if you could use a handshake capture from wifite with hashcat after it's been converted obviously? Gave up with aircrack-ng and crunch after over 56 hours and over 2 billion keys tested.
after the third step it gives me this error - "hcxdumptool: unrecognized option '--active_beacon'". could you do a remake / updated version of this video
Hello, is that piece of hardware necessary to carry out this attack? Shouldn't the built in network adapter be able to scan the networks and give us the same information? I'm trying to use the built in wifi adapter in my computer but I'm getting the following error: "Failed to detect wlan interface: operation not supported"
Your built in adapter almost certainly wont have injection or monitoring modes built into it which are required hence why he recommends alfa brand that supports those modes.
David does Alfa awus036acm has VIF or VIRTUAL INTERFACE can i use that in EVIL TWIN Attack? If yes which one is better to buy AWUS036ACM or AWUS036ACHM ??? Please reply David i really need your advise please🙏🙏🙏🥰
That's was awesome video... I was trying to figure out what changed in hashcat. I will have to update my OS. Question for you since GPU are still expensive and hard to get where did you get yours?
I have that 2 antenna adapter and use it on Kali and it's plug and play. What other software is needed? Is that why I have to manually switch it to 5ghz?
Hi David. Thank you for the video. I have been following along but it seems my hcxdumptool doesn't have the --help options that yours have.. -o is replaced by -w and --enable_status doesn't seem to be present.. PS: I've installed the latest version Any advice?
Hi there @everysunday7929 apologies for the delayed response. If you fast track David's video to 07:01 you will see him show the version of the hcxdumptool which he downloaded from github. If you go to the github page, you will see that David's version displayed in this video is now outdated. You will then navigate the github page to find the Releases option (just have a look around). It should then show you previous version releases like the 1 David uses in this video. The release will have a READMe file to help walk you through Installing that specific version. I'm rooting for you man.. I hope this helps
Quick question.. and sorry if it shows my true NOOBNESS but is it possible to do what you did in cmd on kali itself? Im running it off of an old dell inspiron 15 thats refusing to update past win10 1607 so im not able to run a vm.. im trying to follow along with a liveboot usb
David, I noticed that you had two Alfa wifi adapters in the video, also you use them interchangeably. Why use the 2.4 over the 2.4-5ghz? Why not just use one?
Using multiple cards gives you better channel coverage. You can set them independently to monitor multiple channels, or use one for monitoring and the other for frame injection techniques.
Great video as usual but correct me if I'm wrong. Using hcxdumptool without a filter will deauth everything around you so technically you have Dos your neighbours access points?
There are many wifi routers that do not send PMKID, especially when it's for home network. So even though you've configured it correctly it might not work. By trials and errors I noticed it.
Hi David, is there away to determine the length of a password that's been captured from an hash file? knowing the length of a password helps to cracking it
Apologies for the glitches in this video 😢 .... looks like the export of this video broke.... I had lots of issues uploading the original video to UA-cam and had to export again quickly and it looks like something else broke. Hopefully won't happen again 😅
Big thanks to Cisco Meraki for sponsoring this video! Learn how to secure hybrid networks so you can stop these kinds of attacks: davidbombal.wiki/meraki
Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Only use the tools demonstrated in this video on networks you have permission to attack.
// MENU //
0:00 ▶ Introduction
1:32 ▶ Software used
2:17 ▶ WiFi Hardware used
3:15 ▶ Commands used
4:17 ▶ Install required software method 1
5:31 ▶ Install using Github
7:20 ▶ hcxdumptool demo using first Alfa adapter
9:15 ▶ Demonstration using second Alfa adapter
11:15 ▶ Real world example - a warning to all of us
13:45 ▶ Use hcxpcapngtool to set format correctly
17:24 ▶ Using hashcat with rockyou wordlist
18:38 ▶ Using hashcat with GPU and bruteforce
// Previous Videos //
Kali Wifi Adapters: ua-cam.com/video/5MOsY3VNLK8/v-deo.html
Old method using airmon-ng: ua-cam.com/video/WfYxrLaqlN8/v-deo.html
Old method using GPUs: ua-cam.com/video/J8A8rKFZW-M/v-deo.html
// COMMANDS //
sudo systemctl stop NetworkManager.service
sudo systemctl stop wpa_supplicant.service
sudo hcxdumptool -i wlan0 -o dumpfile.pcapng --active_beacon --enable_status=15
sudo systemctl start wpa_supplicant.service
sudo systemctl start NetworkManager.service
hcxpcapngtool -o hash.hc22000 -E essidlist dumpfile.pcapng
hashcat -m 22000 hash.hc22000 wordlist.txt
Windows:
hashcat.exe -m 22000 hash.hc22000 -a 3 ?d?d?d?d?d?d?d?d
hashcat.exe -m 22000 hash.hc22000 -a 3 --increment --increment-min 8 --increment-max 18 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d
// SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
UA-cam: ua-cam.com/users/davidbombal
// MY STUFF //
Monitor: amzn.to/3yyF74Y
More stuff: www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
sir please create a video that how to install and setup the kali linux in windows please.🙏🙏🙏
Pin your reply to be on top of comments :)
I thought my wifi is interrupted
what if the password is in the form of letters, can this method be used? as far as i know "?d?d?d?d?d?d?d?d?d?d" is numeric
I want to be a student 🙏🙏
David, I took your CCNA course on Udemy two years ago. Got my CCNA cert, did some security later on following your channel and others. I'm now got a job as a SOC analyst and I'm aiming at becoming a read teamer later on. You helped me get on track with this career. Thank you and keep up the amazing work!
Great news
How much are you making in this field mate?
@@H4R4K1R1x thank you 👍
@@SushilKumar-dw1hf enough to live a good and healthy life tbh
Hii Sir I am Getting this errer "driver is not cfg80211 based and not useable" while running the command "sudo hcxdumptool -i wlan1 -o dumpfile.pcapng --active_beacon --enable_status=15"
David, when you are showing us some awesomeness there are never videos that are too long.
I second this opinion
Dude thank you for being so thorough and actually going through all the little steps. Excellent videos.
Hii Sir I am Getting this errer "driver is not cfg80211 based and not useable" while running the command "sudo hcxdumptool -i wlan1 -o dumpfile.pcapng --active_beacon --enable_status=15"
-o Option is Deprecated so use -w to get output file
--active_beacon is also deprecated so use --beacontx=10
--enable_status is also not acceptable now, so I removed it
Final Command
sudo hcxdumptool -I wlan0 -w dumpfile.pcapng --beacontx=10
I have the same issue
but is does not create the "dumpfile.pcapng" file
this should work:
sudo hcxdumptool -i wlan0mon -w dumpfile.pcapng -F --rds=1
Absolutely.... The tool is updated
This video needs an update
Very good and complete explanation of hashcat. Better approach to collecting hashes this way then the classic disconnecting the client from the AP. Quite interested to see the next video with a bigger GPU or multiple GPUs or maybe even try to explain GPU clusters with Hashtopolis. Thanks!
Hii Sir I am Getting this errer "driver is not cfg80211 based and not useable" while running the command "sudo hcxdumptool -i wlan1 -o dumpfile.pcapng --active_beacon --enable_status=15"
@@ASHOKKUMAR-sf7sx Idk if you've figured it out but it sounds like your adapter is not compatible. Hope you already have it figured out
Thanks!
Hi David, just to be sure at 8:23 u are showing list of cmds and there is --enable_status=1, but u're using --enable_status=15 in CLI, should we keep 1 or go with 15 (this is probably a typo)
Go with 15 😀
@@davidbombal thanks David
was looking for this much needed reply
I love these videos. I appreciate you David.
Very happy to hear that!
Why does David doesnt answer my question?
@@ahmadkhalidhotak4348 u smell bad..
@@slowmosheet3367 when you guys can't answer the question, something like that is supposed to be said by you awful guys.
@@ahmadkhalidhotak4348 geez man, chill out. I’m sure he has to read through hundreds of comments at a time and probably responds to the ones that he connects with and relates to most. Maybe make your comments better?
Hi David, at 8:44 when using the comand: "sudo hcxdumptool -i wlan0 -o dumpfile.pcapng --active_beacon --enable_status=15", do I stop the terminal or do I let it continue? After a couple of minutes it doesn't make any progress really andif I try to stop it I simply can't use ^C, nothing happens at all, if I close the terminal and open a new one any command I write connectivity related as, I believe, the wifi stops working, checking it, it says "NetworkManager is not running...", any advice?
Bro i literally just wanted to learn about password cracking and this comes up! Love your video as always david :3
On this method i am able to retrieve the password of the wifi, but can't find the 8 digit PIN of the router like him. Can you explain why and how ?
@@ahmadkhalidhotak4348 The 8 digit is the wireless password on the WIFI router. I think you are confusing yourself.
Hi, at 8:36, after i hit enter, i have this error : hcxdumptool: invalid option -- 'o', can someone help me @David Bombal. Thanks
I also want to wish you all the very best. Thank you for the amazing content David. God bless you.
I'm blessed by your work Sir. Your free unconditional teaching and knowledge you gave us has immensely rooted with in us. Seeing you new work every weeks gives me a desire that I want to learn ethical hacking and free myself.
TRASH
Just awesome. It works without any error in Kali Linux. But In windows it taking more time from hash software so I quit it.
The adaptor which was showing at video. Already bought in one year ago I feel lucky to having this adaptor which is future on David Bombal channel. Thank you for the video.
You're welcome and thank you for watching :)
Great learning tutorial David. Did you ever do a video using a higher end GPU for doing more complex passwords that are using alpha-numeric as mentioned at 12:55 ? I would like to see how that scenario performs using this method.
I learn wifi hacking technique 7 years ago but i didn't give continue on hacking skills. Thanks David for this video which helps me to revised all.
Boy does this video bring back old memories. First hack I ever completed as a kid and where my love of hacking started. Good stuff man
this video was only made 2 months ago..
@Caleb Looney yeah and they also used to be allot easier.
Im so love your content #1👑, waiting for the video with the gpu😎
Excellent Video. I was able to recover passwords using your methods. I have an NVIDIA 3090 card, it is 5 times faster then a 1650 card. Still took two hours to recover a 10 numbered password however. Looking forward to your next video.
Best teacher , really enjoyed and learned a lot .
pls continue posting videos .
Glad you like it! Thank you!
Been watching your videos for a few months and have learned a ton! I recently scored my first real full time I.T. contract for a corporate office.
David this video helped me a lot during a pentest with a client that uses a mesh WiFi network where airodump-ng doesn't worked as spected becuse every time i used a deauth attack, the device reconnect on a different access point and i was unable to get the handshake. Thanks a lot!!
Great Video Bombal Sir! Am in Class 8 and learning a great deal of things from ur vids! Thanks so much for the free information
Sir , I find only your videos much more convenient, useful , friendly with smooth English and simple explanation about the ethical hacking and so on topics . Thank you very much for teaching us so much amazing things !!
man you are legend
Can’t wait to see part 2 , very educational ! Great videos!
he launched the part 2 ?
love the new way has been working on my pine apple nano
andgot this all working
please help at 8:29 when entering the command hcxdumptool says invalid option -- 'o'
edit: replace o with w, but a new error comes up saying --active_beacon is not recognized
same
@@redgreenbluedragon this tutorial no longer works, hashcat updated to v6.30 has new commands
Seriously man if my parents ask how had you grown up - i would simply say David bombal name. Thanks man love you from India
❤❤❤❤
hi david awesome vids but hcxdumptool changed can you do an updated video
Good video. Everything worked, I also compiled hashcat from the sources. However one of my 6 GPUs overheated after about 15 mins of cracking. 😬
Hello David, can you please make a new video about the new and re-written hcxdumptool 6.3.x?
Can you also show how to connect hashcat to another PC so they can work together with the Brain feature? Please please please 🙏🙏🙏🙏🙏🙏
At 6:03 as the link to those dependencies is nowhere to be found.
Maybe they're now integrated as part of latest v 6.3.1
I did the updates to hcxdumptool after running into issues with the 2200x hashes while doing a hashcat module on HackTheBox that required us to convert a pcap file. However, I had NO IDEA why the old hashes were depreciated. This is awesome! I hated all the things that needed to "line-up" previously to have a shot at cracking WPA2. It's so much easier to just dump the hashes into my hashcat rig haha
Cisco I favour the willingness in sponsorship in content promotion in the spectrum shown here.
I further liked to express thanks for sparking and fanning a flame thus leading to minds; possibly being intrigued then pursuing Sec+ filling voids. More essential minds able to elaborate what " online & privacy / security " means
HI David, i learn a lot of knowledge from your video ....Abdulsalam Yahya from Libya
I have enjoyed your videos, they are very well structured and give great step by step instruction. I love to hack but watching your videos now I want to learn so much more! Thank you for your time!
Awesome as always.... Really enjoyed and learned so much. Stay blessed
Thank you very much! Really happy to hear that!
You are a great teacher, I really enjoy your videos
Support team didn’t work! Tho Zspynerd ⬆️ unban my account permanently from tinder database!!
David had u made that video with big GPU method ?
Thanks David. I deleted my previous comment as I wasn't paying attention! It's handy splitting the sniffing and cracking between Kali and Windows, I can put the VM on my laptop and remote to my gaming rig at home to crack. Perfect.
Really good video, the adapter is coming tomorrow and I'm looking forward to playing!
rockyou + Base64 rule + RTX 3080 , it took me about 3 minutes of sniffing and less than 10 seconds of cracking to expose my password!
@@YLCGUK Do you have an example string on how you used Base64? Thanks.
@David Bombal Hello, If you leave the hcxdumptool running for a very long time in the same location(stationary/not walking around) it will it collect more/better information ? or after a few minutes will it have collected everything it possibly can ? or is it dependant on network activity ?
CHeers very much
Wow that's a lot of work, I even get lost at some point but I'll keep watching til I master it 😁
Awesome video once again, And I should give this a go with my gaming laptop..
Did you try this? And what were the results ?
Hello David! There a new version of dumptool.. would you consider updating your video accordingly or not really planned? Thx in advance
Yayyy another way to crack something I waited for this so long.....
Best teacher ( DAVID ) ,Thanks a lost of your Great video's -:)
I did that tonight. I had some errors, but I found a way out.
Well, the worldlist is your weapon. A big plus is that you can put your laptop in wifi scanning, take your laptop, and go around the block to find more essids and afterwards crack them all at once.
The bigger the worldlist, the better 😅
Hello David, greetings from Turkey, thank you for your videos tutorial
Your content is very nice, keep going, God willing, you will reach 5.000.000 All respect to you sir David Bombal🇵🇸I am from Palestine
Timestamp @8:45 , hi David capturing active beacons in managed mode of wifi adapter? Monitor mode not required for it please explain a bit
the command puts your adapter into monitoring mode.
Btw, Ctr + Shift + V/C can be used for copy and paste on Linux machines. I see everyone manually copying and posting in these videos, so I thought I'd give a helping hand by potentially reducing the amount of work you have to do in order to do simple things like copy and paste.
Also, it's worth mentioning that you can edit your nano config file to work like vim without annoying issues like saving and exiting file edits. With a little bash scripting, you can have nano working similar to vscode, or vim, if you'd like.
The nano config file is located at /etc/.nanorc/. You can edit this file via sudo nano /etc/.nanorc/
Thank you for your Udemy Wireshark course and general for everything you have done towards IT knowledge .I hope i meet you somewhere in the Uk and get you a pint mate thanks.Ps I'm from Brum Jarek
Thank you respected sir for your video. May I ask you two questions :
- why you have to close two services before initiating the scan? Is it because you didn't want to have other packet exchanges when scan is running?
- why did you used external wifi adapter. Why didn't you used built-in laptop wifi adapter?
Thank you in advance.
1) Running network services during the scan can cause packet interferences.
2) the external network card supports monitor mode and packets injection, which is required to capture the pcapng file
Incredibly informative video! I noticed some of your hcxdumptool commands are now out of date for version 6.3.1. Do you have an updated video for the new version? Love your channel!
Hello
I get the error :
hcxdumptool : invalid option -- 'o'
does anyone know why ?
Thank's
Use --w
Hi David thanks for guiding me trough hascat and keeping me up to date (as always)
Can you make a video about Beef next like netzorkchuck? But with port forwarding? Would be wonderful!
Best teacher ever, never leave us please💕🔥
most of the actions in the tool have been changed and so the codes in the video are incorrect, you need to update this video to the newer tool update
thanks for saving me the trouble
Love the tutorial, you are a great teacher!
Hi David, when I run the hcxdumptool on kali the whole OS freezes and I end up restarting... are you aware of this issue? do you have any ideas on how I can move forward?
Just want to say thank you for all your videos, another great one David, you present it in an easily understandable format - hats off. What virtualization software (or is a cloud based instance) do you use from your Mac and is there a certain version of Kali Linux that you use if you don't mind answering while I wait for part two as it were with bigger GPU or multiple GPUs?
Hii Sir I am Getting this errer "driver is not cfg80211 based and not useable" while running the command "sudo hcxdumptool -i wlan1 -o dumpfile.pcapng --active_beacon --enable_status=15"
@davidbombal
Hi David, I have been following you for a while now and may I say what a wonderful job you are doing. Your content is top quality and easy for beginners to understand and grasp the fundamentals behind every topic you bring to us.
I have a question David. I know I could probably Google it and find the answer but I would like help from my favourite online teacher 😁
Question:
So with the old method of capturing the hash file we needed to put the network card in monitor mode. In your video I did not see you put the card into monitor mode? So with this new method as long as you have the required network card you don't need to put it in monitor mode! Is that right ?
Thanks in advance 🎉
Hey David on 8:32 i get invalid option -- o . What can i do ?
can you please show us how to use big GPUs as you mentioned
Hi , hello David sir ! How are you and your family ! After long time you post videos ! 😁
hashcat gives me an error "No hashes loaded" I captured the handshake using wifite and even tried with airgeddon but still hashcat won't run
Hi David -E comes out as an invalid option….. any ideas?
can you make a new and updated video on this topic and maybe using a simpler method? Earlier all we had to do was to convert the .cap file to hccapx and then feed it to hashcat using "-m 2500", but since that is deprecated, isn't there a similar straight forward way to do so?
Very complicated ...informative and Helpful
Can we use the .cap file from wifite and convert it to .hc22000 using the same hcxpcapng tool? Or does the hcxpcapng tool work only with .pcapng files and not .pcap files?
Why could it be that --active_beacon does not work?
Great video. Couldn't have come at a better time, iv been stuck on hashcat lately and wondered if you could use a handshake capture from wifite with hashcat after it's been converted obviously? Gave up with aircrack-ng and crunch after over 56 hours and over 2 billion keys tested.
Lmao! There’s going to be a lot of disappointment when people realize it’s not that easy.
after the third step it gives me this error - "hcxdumptool: unrecognized option '--active_beacon'". could you do a remake / updated version of this video
+1
Please can you do a update version of this video? hcxdumptool change the commands
Hi David, shows me that "driver is busy: failed to transmit internal beacon" what should I do?
I can't use hashcat in cmd in windows 10 it says insufficient space allocation, what to do? I use a notebook computer
Hello, is that piece of hardware necessary to carry out this attack? Shouldn't the built in network adapter be able to scan the networks and give us the same information?
I'm trying to use the built in wifi adapter in my computer but I'm getting the following error: "Failed to detect wlan interface: operation not supported"
built-in adapter likely can't be put into Monitoring mode.
I got a message saying driver is busy: failed to transmit acknowledgment
Sir I can't afford any strong adapter can't we do it using vmware directly if yes please guide us for the same
So once you have the pcapng file, can you leave and take that to a more powerful computer and brute force attack any password?
while running the command "sudo hcxdumptool -i wlan1 -o dumpfile.pcapng --active_beacon --enable_status=15" it shows invalid option --''o''
True
same
Run it like this ( hcxdumptool -i wlanX -w dumpfile.pcapng ) and it will work
@@Mustafa-muhammed2 it will filed with me "failed to get interface index: No such device" it say this evry time
Any reason to get a wife adapter if your laptop already has built in Wi-Fi? Or is this adapter more powerful than the one built in the computer?
Your built in adapter almost certainly wont have injection or monitoring modes built into it which are required hence why he recommends alfa brand that supports those modes.
Outdated information! Could you do everything yourself too with hcxdumptool 6.3.1-61 ?
Hi David! great video!! just one inquiry. There is no need to place first the wireless adapter in monitor mode to run the hcxdumptool? thanks!
Great tutorial David!
David does Alfa awus036acm has VIF or VIRTUAL INTERFACE can i use that in EVIL TWIN Attack? If yes which one is better to buy AWUS036ACM or AWUS036ACHM ??? Please reply David i really need your advise please🙏🙏🙏🥰
That's was awesome video... I was trying to figure out what changed in hashcat. I will have to update my OS. Question for you since GPU are still expensive and hard to get where did you get yours?
The increment min and Max with (?d?d…) works also for alphanumeric?
I get a error message saying hcxdumptool: invalid option - ‘o’
Hi, grate video! with which software you are controlling the windows laptop from your Mac?
I have that 2 antenna adapter and use it on Kali and it's plug and play. What other software is needed? Is that why I have to manually switch it to 5ghz?
Hi David. Thank you for the video. I have been following along but it seems my hcxdumptool doesn't have the --help options that yours have.. -o is replaced by -w and --enable_status doesn't seem to be present..
PS: I've installed the latest version
Any advice?
The current version I'm using is hcxdumptool 6.3.4-14-g3693e77 (C) 2024 ZeroBeat
I rolled back to the version that you're using and it works now
@@keegankinnear344 can I please tell me how to roll back updates,or install older version ASAP??
Hi there @everysunday7929 apologies for the delayed response.
If you fast track David's video to 07:01 you will see him show the version of the hcxdumptool which he downloaded from github.
If you go to the github page, you will see that David's version displayed in this video is now outdated. You will then navigate the github page to find the Releases option (just have a look around). It should then show you previous version releases like the 1 David uses in this video.
The release will have a READMe file to help walk you through Installing that specific version.
I'm rooting for you man.. I hope this helps
17:02 Someone be drifting away from this hacker's home for safety ;)
Quick question.. and sorry if it shows my true NOOBNESS but is it possible to do what you did in cmd on kali itself? Im running it off of an old dell inspiron 15 thats refusing to update past win10 1607 so im not able to run a vm.. im trying to follow along with a liveboot usb
David, I noticed that you had two Alfa wifi adapters in the video, also you use them interchangeably. Why use the 2.4 over the 2.4-5ghz? Why not just use one?
Using multiple cards gives you better channel coverage. You can set them independently to monitor multiple channels, or use one for monitoring and the other for frame injection techniques.
@@nimbuI ahhh okay, the makes sense. Thank you.
Hi sir i want know how u save the file from VMware to windows to hashcat
Great video as usual but correct me if I'm wrong. Using hcxdumptool without a filter will deauth everything around you so technically you have Dos your neighbours access points?
There are many wifi routers that do not send PMKID, especially when it's for home network. So even though you've configured it correctly it might not work. By trials and errors I noticed it.
Hi David, is there away to determine the length of a password that's been captured from an hash file? knowing the length of a password helps to cracking it
no