/pwnagotchi-scripts

Grabs pcap off Pwnagotchi, converts to hc22000 format and generates attack rules/scripts for hashcat.

Primary LanguagePython

pwnagotchi-scripts

Needless to say, this project is for EDUCATIONAL use only and is not intended for any illegal usage.

Inspired by pwnagotchi-tools, Hashcat has since deprecated the 2500/16800 plugins. These scripts will do the following:

  • SSH into pwnagotchi & pull .pcap handshakes
  • Convert pcap to hc22000 format for hashcat

Required:

wget https://hashcat.net/files/hashcat-6.2.6.7z

Extract contents

7z x hashcat*

Move to pwnagotchi-scripts hashcat directory

sudo mv hashcat-6.2.6 /path/to/pwnagotchi-scripts/hashcat/hashcat

Wordlists

You will need to download the following wordlists. Move them to /pwnagotchi-scripts/wordlists directory

Configuration

Configuration is very simple. You actually do not need to change anything if you extract hashcat and the wordlists to the configured directories. If you wish to change them however, you can modify the following in grab_and_convert.sh

SSHKEY=
HASHCAT_LOCATION=
WORDLIST_LOCATION=

Running

  • Pull files from pwnagotchi, convert to hc2000 and create attack script.
sudo sh grab_and_convert.sh
  • Crack with Hashcat
cd hashcat/scripts && sh hash.sh