Skip to content

Commit

Permalink
added more information about hcxdumptool's three attack vectors
Browse files Browse the repository at this point in the history
  • Loading branch information
ZerBea committed May 30, 2024
1 parent 46ce3a5 commit 904a2a8
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -246,6 +246,8 @@ The entire toolkit (hcxdumptool and hcxtools) is designed to be an analysis tool

If you can't control the environment it is absolutely mandatory to set the [BPF](https://wiki.wireshark.org/CaptureFilters)!

The BPF can be used to select a target (or multible targets) or to protect devices.

By default options hcxdumptool is running three attack vectors:

* connect to an ACCESS POINT to get a PMKID (turn off by --attemptapmax)
Expand All @@ -254,8 +256,6 @@ By default options hcxdumptool is running three attack vectors:

* allow a CLIENT to connect to hcxdumptool to get a challenge (M1M2) or an EAP-ID (turn off by --attemptclientmax)

They can be turned off using options. The BPF can be used to select a target (or multible targets) or to protect devices.

You must use hcxdumptool only on networks you have permission to do this and if you know what you are doing, because:

* hcxdumptool is able to prevent complete WLAN traffic transmission. (Depending on selected options.)
Expand Down

0 comments on commit 904a2a8

Please sign in to comment.