Skip to content

Commit b00b30e

Browse files
committed
Add OSX support through the appendix. Version bump to v1.2.
1 parent e92fea2 commit b00b30e

File tree

4 files changed

+55
-80
lines changed

4 files changed

+55
-80
lines changed

CHANGELOG.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,9 @@
11
# Changelog
22

3+
## 1.2
4+
5+
- Add MacOS/OSX support via the [appendix](appendix.md), thanks [harshpatel991](https://github.com/harshpatel991)!
6+
37
## 1.1
48

59
- Add [appendix](appendix.md)

README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ __DISCLAIMER: This software/tutorial is for educational purposes only. It should
1313
This tutorial assumes that you:
1414

1515
- Have a general comfortability using the command-line
16-
- Are running a debian-based linux distro (preferably [Kali linux](https://www.kali.org/))
16+
- Are running a debian-based linux distro, preferably [Kali linux](https://www.kali.org/) (OSX users see the [appendix](appendix.md))
1717
- Have [Aircrack-ng](http://aircrack-ng.org/) installed
1818
- `sudo apt-get install aircrack-ng`
1919
- Have a wireless card that supports [monitor mode](https://en.wikipedia.org/wiki/Monitor_mode) (see [here](http://www.wirelesshack.org/best-kali-linux-compatible-usb-adapter-dongles-2016.html) for a list of supported devices)
@@ -248,6 +248,7 @@ HASH_FILE=hackme.hccapx POT_FILE=hackme.pot HASH_TYPE=2500 ./naive-hashcat.sh
248248

249249
The response to this tutorial was so great that I've added suggestions and additional material from community members as an [appendix](appendix.md). Check it out to learn how to:
250250

251+
- Capture handshakes and crack WPA passwords on MacOS/OSX
251252
- Capture handshakes from every network around you with `wlandump-ng`
252253
- Use `crunch` to generate 100+GB wordlists on-the-fly
253254
- Spoof your MAC address with `macchanger`

README_OS_X.md

Lines changed: 0 additions & 77 deletions
This file was deleted.

appendix.md

Lines changed: 49 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,53 @@
11
# Appendix
22

3-
After the initial release of this tutorial, several people from various corners of the internet reached out with comments and suggestions. Two of the most interesting are alternative methods for capturing 4-way handshakes using `wlandump-ng` and programatically generating wordlists for Aircrack-ng using `crunch`. In an effort two keep the original tutorial short and sweet, I've included information about their wonderful suggestions here, and added a few of my own.
3+
After the initial release of this tutorial, several people from various corners of the internet reached out with comments and suggestions. In an effort two keep the original tutorial short and sweet, I've included information about their wonderful suggestions here, and added some of my own. Here you will find info on:
4+
5+
- Wi-Fi cracking on MacOS/OSX
6+
- Capturing handshakes with `landump-ng`
7+
- Generating wordlists with `crunch`
8+
- Protecting your identity with `macchanger`
9+
10+
## Wi-Fi cracking on MacOS/OSX
11+
12+
Huge thanks to [@harshpatel991](https://github.com/harshpatel991) for contributing this guide. The following explains how to use built-in MacOS/OSX tools to capture a 4-way handshake and naive-hashcat to determine the password of a WPA/WPA2 wireless network. This method has been tested on OSX versions 10.10 and 10.12 but will likely work with other versions as well. Like the main tutorial, it assumes you have a [wireless card](http://www.wirelesshack.org/best-kali-linux-compatible-usb-adapter-dongles-2016.html) that supports [monitor mode](https://en.wikipedia.org/wiki/Monitor_mode). We've tested this on both Early-2012 and Mid-2015 Macbook Pros with great success.
13+
14+
### Wireless Diagnostics tools
15+
16+
Luckily, OSX comes with a suite of wireless diagnostic tools. To open them, hold down the option key on your keyboard and click on the Wi-Fi icon in the menu bar. Then click "Open Wireless Diagnostics..."
17+
18+
### Determine the channel of your target network
19+
20+
With Wireless Diagnostics open, click on Window > Scan. Find the target network, note its channel and width.
21+
22+
### Capture a 4-way Handshake
23+
24+
1. With Wireless Diagnostics open, click on Window > Sniffer. Select the channel and width that you found in the previous step.
25+
2. Now you'll need to wait for a device to connect to the target network. If you are testing this on your network (which you should be), reconnect a wireless device to capture a handshake.
26+
3. Once you think you've got a handshake, click Stop.
27+
4. The `.wcap` capture file will either be saved to your Desktop or `/var/tmp/` depending on your operating system version.
28+
5. Convert the capture file to `.hccapx` by uploading it to https://hashcat.net/cap2hccapx/. If you captured any handshakes, the site will start downloading a `.hccapx` file. No download will be prompted if you did not.
29+
30+
### Crack the password with `naive-hashcat`
31+
32+
```bash
33+
# clone naive-hashcat
34+
git clone https://github.com/brannondorsey/naive-hashcat
35+
cd naive-hashcat
36+
37+
# build from source on MacOS/OSX
38+
./build-hashcat-osx.sh
39+
40+
# download the 134MB rockyou dictionary file
41+
curl -L -o dicts/rockyou.txt https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt
42+
```
43+
44+
Finally, run `naive-hashcat.sh`. Change `handshake.hccapx` to the name of the file you downloaded from [hashcat.net](https://hashcat.net/cap2hccapx/). `cracked.pot` is the name of the output file.
45+
46+
```
47+
HASH_FILE=handshake.hccapx POT_FILE=cracked.pot HASH_TYPE=2500 ./naive-hashcat.sh
48+
```
49+
50+
Thanks again to [@harshpatel991](https://github.com/harshpatel991), as well as [phillips321](http://www.phillips321.co.uk/) for his [post](https://www.phillips321.co.uk/2016/07/09/hashcat-on-os-x-getting-it-going/) about building hashcat for OSX.
451

552
## Capturing handshakes with `wlandump-ng`
653

@@ -95,7 +142,7 @@ crunch 10 10 -t "%%%%%%%%%%" | aircrack-ng -a2 capture.cap -b 58:98:35:CB:A2:77
95142

96143
Thanks to [@hiteshnayak305](https://github.com/hiteshnayak305) for the introduction to `crunch` and including this update as a [PR](https://github.com/brannondorsey/wifi-cracking/pull/17).
97144

98-
## Macchanger
145+
## Protecting your identify with `macchanger`
99146

100147
Whenever you are doing anything remotely nefarious with Wi-Fi, it is a good idea to spoof your the MAC address of your Wi-Fi device so that any network traffic that gets recorded can't be tied to serial assigned by your device manufacturer.
101148

0 commit comments

Comments
 (0)