All Projects → dizcza → hashcat-wpa-server

dizcza / hashcat-wpa-server

Licence: MIT license
Hashcat WPA/WPA2 server

Programming Languages

python
139335 projects - #7 most used programming language
HTML
75241 projects
Dockerfile
14818 projects

Projects that are alternatives of or similar to hashcat-wpa-server

password-list
Password lists with top passwords to optimize bruteforce attacks
Stars: ✭ 174 (+569.23%)
Mutual labels:  hashcat, cracking-hashes
Duplicut
Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)
Stars: ✭ 352 (+1253.85%)
Mutual labels:  hashcat, password-cracking
Crack-O-Matic
Find and notify users in your Active Directory with weak passwords
Stars: ✭ 89 (+242.31%)
Mutual labels:  hashcat, cracking-hashes
Pantagrule
large hashcat rulesets generated from real-world compromised passwords
Stars: ✭ 146 (+461.54%)
Mutual labels:  hashcat, password-cracking
Hashview
A web front-end for password cracking and analytics
Stars: ✭ 601 (+2211.54%)
Mutual labels:  hashcat, password-cracking
HashExploit
HashExpoit is Great Tool For Cracking Hash
Stars: ✭ 17 (-34.62%)
Mutual labels:  password-cracking, cracking-hashes
hashcatbenchmark
Benchmark in Hashcat for diferents GPU's
Stars: ✭ 19 (-26.92%)
Mutual labels:  wpa, hashcat
cracke-dit
cracke-dit ("Cracked It") makes it easier to perform regular password audits against Active Directory environments.
Stars: ✭ 102 (+292.31%)
Mutual labels:  hashcat, password-cracking
multicapconverter
Tool used to Convert a cap/pcap/pcapng capture file to a hashcat hcwpax/hccapx/hccap/hcpmkid/hceapmd5/hceapleap file
Stars: ✭ 43 (+65.38%)
Mutual labels:  wpa, hashcat
Colabcat
😺 Running Hashcat on Google Colab with session backup and restore.
Stars: ✭ 407 (+1465.38%)
Mutual labels:  hashcat, password-cracking
Webhashcat
Hashcat web interface
Stars: ✭ 151 (+480.77%)
Mutual labels:  hashcat, password-cracking
Wifi Cracking
Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat
Stars: ✭ 9,546 (+36615.38%)
Mutual labels:  hashcat, password-cracking
Kaonashi
Wordlist, rules and masks from Kaonashi project (RootedCON 2019)
Stars: ✭ 353 (+1257.69%)
Mutual labels:  hashcat, password-cracking
Naive Hashcat
Crack password hashes without the fuss 🐈
Stars: ✭ 726 (+2692.31%)
Mutual labels:  hashcat, password-cracking
wifimitm
Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
Stars: ✭ 49 (+88.46%)
Mutual labels:  wpa, password-cracking
Wifi-Cracker
Wifi Cracking
Stars: ✭ 128 (+392.31%)
Mutual labels:  wpa
Cloudtopolis
Zero Infrastructure Password Cracking
Stars: ✭ 137 (+426.92%)
Mutual labels:  hashcat
WPA2-FritzBox-Pswd-Wordlist-Generator
This Script will produce all of the WPA2 Passwords used by various Router companies aswell as Fritzbox. All of these Passwords will be 16 Numbers in length. So it could get a bit large.
Stars: ✭ 22 (-15.38%)
Mutual labels:  wpa
pwnagotchi-display-password-plugin
Pwnagotchi plugin to display the most recently cracked password on the Pwnagotchi face
Stars: ✭ 37 (+42.31%)
Mutual labels:  wpa
Hashcat
World's fastest and most advanced password recovery utility
Stars: ✭ 11,014 (+42261.54%)
Mutual labels:  hashcat

Docker Hub

Hashcat WPA/WPA2 server

Yet another WPA/WPA2 hashes cracker web server. Powered by hashcat. The backend is written in Python Flask.

Supported capture file formats:

  • .pcapng (hcxdumptool)
  • .cap and .pcap (airodump)
  • .hccapx and .2500 (EAPOL)
  • .pmkid and .16800 (PMKID)
  • .22000 (PMKID/EAPOL)

The server uses Hashcat Brain transparently for the user (the user is allowed to activate and deactivate the feature).

Every password cracking researcher is proud of his/her wordlists and rules. Here is my strategy of checking the most probable passwords that require only a few minutes to run on any laptop or Raspberry Pi. The strategy is marked as '(fast)' among wordlist choices in UI. They are all run in BaseAttack.run_all() method:

  • run_essid_attack:
    • Hamming ball ESSID attack (perturb ESSID name with at most Hamming distance '2');
    • Split ESSID in word compounds with wordninja. For example "PetitCafe2017" ESSID is split in ['2017', '2017Cafe', '2017CafePetit', '2017Petit', 'Cafe', ..., 'CafePetit2017'] which increases the chance of finding passwords of type "PetitXXXX" by running the combinator attack for each of the word compounds combination. Technically, for each essid_i word compound, it runs
      • essid_i + digits_append.txt (prepend and append) combinator attack (-a1);
      • essid_i + best64.rule attack;
  • run_top1k: Top1575-probable-v2.txt + best64.rule attack.
  • run_digits8: birthdays 100 years backward, digits masks like aabbccdd (refer to mask_8-12.txt), digits cycles, and more.
  • run_keyboard_walk: keyboard-walk attack.
  • run_names: names_ua-ru.txt with best64 attack.

Demo

Check out a running server on a CPU instance: http://85.217.171.57:9111. To surf the site, login with the guest:guest credentials. (Yes, you don't have the permissions to start jobs. Contact me if necessary.)

Command line interface

You can quickly test a handshake file against non-secure passwords, in other words, run the (fast) mode from a terminal:

python app/attack/base_attack.py /path/to/handshake.22000
optional arguments:
  --fast      Run ESSID+digits attack with fewer examples. Default: turned off
  --extra     Run extra attacks (names UA)

Deployment

Launching from the terminal

Run the following commands from the root hashcat-wpa-server folder:

pip install -r requirements.txt  # required only once

HASHCAT_ADMIN_USER=admin HASHCAT_ADMIN_PASSWORD=<your-secret-password> gunicorn app:app

Docker containers

Note. Using GPU hardware requires nvidia-docker2 to be installed on your host machine.

Using Docker Hub

There are 3 docker tags (branches):

  • latest: Nvidia GPUs;
  • intel-cpu: Intel CPUs;
  • pocl: an alternative to intel-cpu tag, an open source implementation of OpenCL.

For example, to run the latest tag (makes sense only if you have at least one GPU), open a terminal and run

docker run --runtime=nvidia -d \
    -e HASHCAT_ADMIN_USER=admin \
    -e HASHCAT_ADMIN_PASSWORD=<your-secret-password> \
    -v ${HOME}/.hashcat/wpa-server:/root/.hashcat/wpa-server \
    -p 9111:80 \
    dizcza/hashcat-wpa-server:latest

If you don't have a GPU, try intel-cpu or pocl tag:

docker run -d \
    -e HASHCAT_ADMIN_USER=admin \
    -e HASHCAT_ADMIN_PASSWORD=<your-secret-password> \
    -v ${HOME}/.hashcat/wpa-server:/root/.hashcat/wpa-server \
    -p 9111:80 \
    dizcza/hashcat-wpa-server:intel-cpu

That's all! Navigate to localhost:9111. The captured handshakes, user-defined wordlists and rules, and the SQL database will be stored in the ~/.hashcat/wpa-server folder.

Building the image locally

mkdir -p ~/.hashcat/wpa-server
export HASHCAT_ADMIN_USER=admin
export HASHCAT_ADMIN_PASSWORD=<your-secret-password>
cd ./docker
nvidia-docker-compose -f docker-compose.yml build
nvidia-docker-compose -f docker-compose.yml up -d

User wordlists

Hashcat-wpa-server app is shipped with the default Top-xxx-probable wordlists. If you want to make use of your custom wordlists, place them in the ~/.hashcat/wpa-server/wordlists folder (create one).

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].