WebsiteTemplate/cheatsheets/hcxdumptool.html
2026-01-25 11:33:37 -04:00

227 lines
8.1 KiB
HTML

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta http-equiv="Content-Security-Policy" content="default-src 'self'; script-src 'self'; style-src 'self'; font-src 'self' data:; img-src 'self' data:; connect-src 'self'; base-uri 'self'; form-action 'self' https://defcon.social https://bsky.app;">
<meta http-equiv="X-Content-Type-Options" content="nosniff">
<link rel="stylesheet" href="../assets/css/style.css">
<link rel="icon" type="image/x-icon" href="../favicon.ico">
<script>
(function() {
const theme = localStorage.getItem('theme') ||
(window.matchMedia && window.matchMedia('(prefers-color-scheme: dark)').matches ? 'dark' : 'light');
document.documentElement.setAttribute('data-theme', theme);
})();
</script>
<title>hcxdumptool Cheatsheet - Cheatsheets - Launch Pad</title>
</head>
<body>
<button class="theme-toggle" id="themeToggle" aria-label="Toggle dark mode">
<svg class="theme-icon theme-icon-moon" xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"><path d="M21 12.79A9 9 0 1 1 11.21 3 7 7 0 0 0 21 12.79z"></path></svg>
<svg class="theme-icon theme-icon-sun" xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" style="display: none;"><circle cx="12" cy="12" r="5"></circle><line x1="12" y1="1" x2="12" y2="3"></line><line x1="12" y1="21" x2="12" y2="23"></line><line x1="4.22" y1="4.22" x2="5.64" y2="5.64"></line><line x1="18.36" y1="18.36" x2="19.78" y2="19.78"></line><line x1="1" y1="12" x2="3" y2="12"></line><line x1="21" y1="12" x2="23" y2="12"></line><line x1="4.22" y1="19.78" x2="5.64" y2="18.36"></line><line x1="18.36" y1="5.64" x2="19.78" y2="4.22"></line></svg>
</button>
<br/><br/>
<div class="name">
__ _______________________ _________._________________________
\_ _____/ \______ \ / _ \ / _____/ / _____/ | | \_ _____/
| __) | _/ / /_\ \ / \ ___ / \ ___ | | | __)_
| \ | | \ / | \ \ \_\ \ \ \_\ \ | |___ | \
\___ / |____|_ / \____|__ / \______ / \______ / |_______ \ /_______ /
\/ \/ \/ \/ \/ \/ \/
</div>
<div class="blog-page-header">
<div class="blog-header-content">
<a href="/cheatsheets" class="back-link" title="Back to Cheatsheets">
<svg xmlns="http://www.w3.org/2000/svg" width="42" height="42" viewBox="0 0 24 24" class="home-icon"><path fill="currentColor" d="M10 20v-6h4v6h5v-8h3L12 3 2 12h3v8z"/></svg>
</a>
<h1 class="blog-page-title">hcxdumptool Cheatsheet</h1>
</div>
</div>
<div class="blog-post-container">
<div class="blog-posts-container" style="max-width: 900px; margin: 0 auto;">
<div class="blog-post">
<div class="blog-post-content">
<p><a href="index.html">← Back to cheatsheets</a></p>
<p><a href="../index.html">← Home</a></p>
<hr>
<p>hcxdumptool is a WiFi handshake capture tool designed to capture WPA/WPA2 handshakes and PMKID hashes from wireless networks. It works with monitor mode interfaces and can extract handshakes even from APs without active clients.</p>
<hr>
<h2>Basic Usage</h2>
<ul>
<li>hcxdumptool -i &lt;interface&gt; -o &lt;output&gt; - Basic capture</li>
</ul>
<ul>
<li>hcxdumptool -i wlan0mon -o capture.pcapng - Capture to file</li>
</ul>
<ul>
<li>hcxdumptool -i &lt;interface&gt; --enable_status=1 -o &lt;output&gt; - With status output</li>
</ul>
<hr>
<h2>Interface Options</h2>
<ul>
<li>-i &lt;interface&gt; - Monitor mode interface (required)</li>
</ul>
<ul>
<li>--filterlist_ap=&lt;file&gt; - Filter list of APs (maclist)</li>
</ul>
<ul>
<li>--filterlist_client=&lt;file&gt; - Filter list of clients</li>
</ul>
<ul>
<li>--filterlist_mac=&lt;file&gt; - Combined filter list</li>
</ul>
<ul>
<li>--filtermode=1 - Filter mode (0=disabled, 1=AP, 2=client, 3=both)</li>
</ul>
<hr>
<h2>Target Selection</h2>
<ul>
<li>-c &lt;channel&gt; - Lock to specific channel</li>
</ul>
<ul>
<li>--do_rcascan - Perform channel scan</li>
</ul>
<ul>
<li>--rcascanlist=&lt;channels&gt; - Channels to scan (e.g., "1,6,11")</li>
</ul>
<ul>
<li>--bpf=&lt;filter&gt; - Berkeley Packet Filter</li>
</ul>
<hr>
<h2>Capture Options</h2>
<ul>
<li>--enable_status=1 - Enable status output</li>
</ul>
<ul>
<li>--enable_status=2 - Verbose status output</li>
</ul>
<ul>
<li>--enable_status=3 - Very verbose output</li>
</ul>
<ul>
<li>--disable_client_attacks - Disable client attacks</li>
</ul>
<ul>
<li>--disable_ap_attacks - Disable AP attacks</li>
</ul>
<ul>
<li>--active_beacon - Send active beacons</li>
</ul>
<ul>
<li>--stop_ap_attacks=&lt;num&gt; - Stop after N AP attacks</li>
</ul>
<ul>
<li>--stop_client_attacks=&lt;num&gt; - Stop after N client attacks</li>
</ul>
<hr>
<h2>Output Options</h2>
<ul>
<li>-o &lt;file&gt; - Output file (.pcapng format)</li>
</ul>
<ul>
<li>-w &lt;file&gt; - Write PMKID to file</li>
</ul>
<ul>
<li>--write_status=&lt;file&gt; - Write status to file</li>
</ul>
<ul>
<li>-k &lt;file&gt; - Read PMKID from file</li>
</ul>
<hr>
<h2>PMKID Capture</h2>
<ul>
<li>--enable_status=1 - Enable PMKID capture</li>
</ul>
<ul>
<li>-w &lt;file&gt; - Save PMKID hashes</li>
</ul>
<ul>
<li>PMKID is captured in first EAPOL message</li>
</ul>
<ul>
<li>No client required for PMKID capture</li>
</ul>
<hr>
<h2>Handshake Capture</h2>
<ul>
<li>Captures 4-way handshake automatically</li>
</ul>
<ul>
<li>Works when clients connect/disconnect</li>
</ul>
<ul>
<li>Can force deauthentication for handshake</li>
</ul>
<hr>
<h2>Common Examples</h2>
<h3>Basic Capture</h3>
<pre><code>sudo hcxdumptool -i wlan0mon -o capture.pcapng</code></pre>
<h3>Capture with Status</h3>
<pre><code>sudo hcxdumptool -i wlan0mon --enable_status=1 -o capture.pcapng</code></pre>
<h3>Capture Specific Channel</h3>
<pre><code>sudo hcxdumptool -i wlan0mon -c 6 -o capture.pcapng</code></pre>
<h3>Filter Specific APs</h3>
<pre><code>sudo hcxdumptool -i wlan0mon --filterlist_ap=ap_list.txt --filtermode=1 -o capture.pcapng</code></pre>
<h3>Capture PMKID Only</h3>
<pre><code>sudo hcxdumptool -i wlan0mon -w pmkid.txt -o capture.pcapng</code></pre>
<h3>Scan Specific Channels</h3>
<pre><code>sudo hcxdumptool -i wlan0mon --do_rcascan --rcascanlist="1,6,11" -o capture.pcapng</code></pre>
<h3>Verbose Output</h3>
<pre><code>sudo hcxdumptool -i wlan0mon --enable_status=3 -o capture.pcapng</code></pre>
<h3>Disable Client Attacks</h3>
<pre><code>sudo hcxdumptool -i wlan0mon --disable_client_attacks -o capture.pcapng</code></pre>
<hr>
<h2>Workflow</h2>
<ol>
<li>Put interface in monitor mode: <code>sudo airmon-ng start wlan0</code></li>
<li>Start capture: <code>sudo hcxdumptool -i wlan0mon -o capture.pcapng</code></li>
<li>Let it run to capture handshakes/PMKIDs</li>
<li>Convert with hcxpcapngtool for hashcat</li>
<li>Crack with hashcat</li>
</ol>
<hr>
<h2>Tips</h2>
<ul>
<li>Interface must be in monitor mode (use airmon-ng or iw)</li>
</ul>
<ul>
<li>Requires root/sudo privileges</li>
</ul>
<ul>
<li>PMKID capture doesn't require active clients</li>
</ul>
<ul>
<li>Handshake capture works best when clients connect/disconnect</li>
</ul>
<ul>
<li>Use --enable_status for real-time information</li>
</ul>
<ul>
<li>Filter lists help focus on specific targets</li>
</ul>
<ul>
<li>Use -c to lock to specific channel for better results</li>
</ul>
<ul>
<li>Output is in pcapng format (compatible with Wireshark)</li>
</ul>
<ul>
<li>Always test on authorized networks only</li>
</ul>
<ul>
<li>Convert pcapng to hashcat format with hcxpcapngtool</li>
</ul>
<hr>
<p><a href="index.html">← Back to cheatsheets</a></p>
<p><a href="../index.html">← Home</a></p>
</div>
</div>
</div>
</div>
<script async type="text/javascript" src="../blog/analytics.js"></script>
<script src="../theme.js"></script>
</body>
</html>