[ol9_developer_EPEL] hcxtools-6.2.9-1.el9.x86_64

Name:hcxtools
Version:6.2.9
Release:1.el9
Architecture:x86_64
Group:Unspecified
Size:551701
License:MIT
RPM: hcxtools-6.2.9-1.el9.x86_64.rpm
Source RPM: hcxtools-6.2.9-1.el9.src.rpm
Build Date:Mon Mar 20 2023
Build Host:build-ol9-x86_64.oracle.com
Vendor:Oracle America
URL:https://github.com/ZerBea/hcxtools
Summary:Portable solution for conversion WiFi dump files to hashcat formats
Description:
Small set of tools convert packets from captures (h = hash, c = capture,
convert and calculate candidates, x = different hashtypes) for the use with
latest hashcat or John the Ripper. The tools are 100% compatible to hashcat
and John the Ripper and recommended by hashcat. This branch is pretty closely
synced to hashcat git and John the Ripper git.

Support of hashcat hash-modes: 4800, 5500, 2200x, 16100, 250x (deprecated),
1680x (deprecated)

Support of John the Ripper hash-modes: WPAPSK-PMK, PBKDF2-HMAC-SHA1, chap,
netntlm, tacacs-plus

Support of gzip (.gz) single file compression.

Main purpose is to detect weak points within own WiFi networks by analyzing
the hashes. Therefore convert the dump file to WPA-PBKDF2-PMKID+EAPOL hash
file and check if wlan-key or plainmasterkey was transmitted unencrypted. Or
upload the "uncleaned" dump file (pcapng, pcap, cap) here
https://wpa-sec.stanev.org/?submit to find out if your ap or the client is
vulnerable by using common wordlists or a weak password generation algorithm.

Filelist (Show Changelog) (Show related packages)