When I moved the phone to theother side of the antenna, so the antenna was between,the ALFA antenna was between the phone and the iPad, that's when I was ableto capture the handshake.
#Kali linux how to install hcxdumptool install
I had the phone on thesame side as my iPad, which is the client, and the antenna's on this side over here. Hello all, I have install hcxdumptool & hcxpcaptool in Kali Linux 64bit, Wifite2 still showing that the tools are missing, can someone shine some light to this issue, I been searching all over the place for a fix or direction with no luck. And one of the thingsthat's kind of interesting is the access point we're usinghere is my phone right here. So the next step, we're gonna covert that capfile to different format and then we'll try tocrack it using hashcat. You see right here it'ssaved it, this dot cap file. It looks like it grabbedthe handshake for kona. So the one client we have isactually this iPad down here. In my experience, if youhave a lot of clients on a busy wireless network, it's easier. And this deauth process can take a while, it's not always consistent.
#Kali linux how to install hcxdumptool password
Once we grab that 4-way handshake, we can run that througha password cracking tool such as hashcat to crack the passphrase. The client with thisMAC address right here, EC:2C:E2 on this wifi network called kona, we're de-authorizing it which'll make it re-authorize itself, or re-authenticate, and thenwhen it re-authenticates, we're trying to grab the 4-way handshake. This tool acts as a container for running tools without installing them. What this is doing is, we're kicking the clientoff of the wireless network. Docker is one of the most popular tools for pentesters, as well as thical hackers. I am using Ubuntu at present, again, works fine. I use the Alfa AWUS036NH with Kali, works out of the box. I am a complete newbie when it comes to Linux and wireless 'hacking', so perhaps this guide is of some use to people, it is from start to finish, a very basic way to get things started. That has two clients connected to it, so I'll do that one as well. HCXDumpTool and HCXTools Command Cheat Sheet.
I'll do Woodlands Condo, which is number 7. I'm gonna select, I'm gonna put a comma, select couple other ones. Now, we're gonna select which ESSIDs or which targets, based on the number on the far left, we want to grab the handshakes from. Looks like we've found quite a bit here, so I'm gonna go ahead and hit ctrl+c. You have to be close to the client, as well as the access point. One other nuance with wireless hacking is you actually have tobe close to the client, in order to kick them off. The more clients you have, the better, and the more power, like the ones here in green, the more likely it is thatyou're going to succeed kicking the client off of the access point and actually grabbing the handshake. The client won't even notice this but wirelessly the 4-wayhandshake for WPA2 will take place and we're going to tryand grab that handshake when the client re-authenticatesto the access point.