XORMANCER / WHITECAT

Crystal utility to automate PMKID capture via HCXDUMPTOOLS

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

image
🔮 Crystal utility to automate the capture of an 802.11 PMKID

📝 Installation

Install the crystal programming language.

For kali linux (debian) users, the following command will install crystal.

curl -fsSL https://crystal-lang.org/install.sh | sudo bash

Next, run the following commands to build main.cr and execute the setup file.

sudo crystal build --release main.cr -o whitecat
sudo chmod +x setup.sh
sudo ./setup.sh

The compiled binary will be moved to /usr/bin/whitecat
All configuration files are located within /usr/share/WHITECAT

:octocat: Usage

sudo whitecat

If a target AP supports PMKID authentication, attempting to connect with an improper password will force a PMKID frame to populate. This can theoretically allow clientless WPA2 authentication, as only an attempted connection is required.

For more information, please visit the original forum explaining the attack HERE

License

MIT

About

Crystal utility to automate PMKID capture via HCXDUMPTOOLS


Languages

Language:Crystal 94.4%Language:Shell 5.6%