s0i37
s0i37
Unfortunately I cant provide packet capture by security reason. Probably you can understand the reason by pictures.   
BTW, ACL read/edit is already implemented in `msldap`. Also `winacl` is a good python library for parsing any ACL. For example https://github.com/skelsec/msldap/issues/22
According `https://github.com/rakshasa/rtorrent/search?q=load_start` `load_start` -> `load.start`
BTW We can use many wpa_supplicant for the same `wlan0` for many threads of online bruteforce. And some AP allow to check a few passwords per second.
``` hcxdumptool -i mon0 -c 1,6,11 --enable_status=15 -o pmkid.pcapng tcpdump -r pmkid.pcapng -nn -w pmkid.pcap aircrack-ng pmkid.pcap -w wordlist.txt ```
My pcap file has m1m2 (wrong pass) and m1m2m3(valid pass), obviously I cant brute it without cleaning: ``` hcxpcapngtool m1m2_m1m2m3.pcap -o eapol.txt --all hcxhashtool -i eapol.txt --authorized -o eapol_valid.txt hcxhash2cap...
For example I connect to AP with any (wrong) password. We have the following: ``` M1 - PMKID with right hash M2 - my entered wrong password hash ``` If...
Probably it was NetNTLMv1?
I will try near future