Needless to say, this project is for EDUCATIONAL use only and is not intended for any illegal usage.
Basically a linux version of pwnagotchi-tools. These scripts will do the following:
- SSH into pwnagotchi & pull .pcap handshakes
- Convert pcap to hc22000 format for hashcat
Required:
- hcxtools
sudo apt-get -y install hcxtools
- 7z
sudo apt-get -y install p7zip-full
- Hashcat 6.2+
- Cuda Toolkit (For GPU)
- Nvidia Drivers (For GPU)
wget https://hashcat.net/files/hashcat-6.2.6.7z
Extract contents
7z x hashcat*
Move to pwnagotchi-scripts hashcat directory
sudo mv hashcat-6.2.6 /path/to/pwnagotchi-scripts/hashcat/hashcat
You will need to download the following wordlists. Move them to /pwnagotchi-scripts/wordlists directory
- known-wpa-passwords.txt - This is your own personal list of your cracked wifi passwords.
- netgear-spectrum.txt - The repo for this list is here
- NAMES.DIC- Any list of all lowercase first names can replace this.
- words_alpha.txt - Any list of all lowercase common words can replace this.
- hashesorg2019
- openwall.net-all.txt
- rockyou - The famous rockyou list.
- Top24Million-WPA-probable-v2.txt
- Top1pt8Billion-WPA-probable-v2.txt
- passphrases.txt - The repo for this list is here.
- Custom-WPA
- Super-WPA
Configuration is very simple. You actually do not need to change anything if you extract hashcat and the wordlists to the configured directories. If you wish to change them however, you can modify the following in grab_and_convert.sh
SSHKEY=
HASHCAT_LOCATION=
WORDLIST_LOCATION=
- Pull files from pwnagotchi, convert to hc2000 and create attack script.
sudo sh grab_and_convert.sh
- Crack with Hashcat
cd hashcat/scripts && sh hash.sh