<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hashcat on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/hashcat/</link><description>Recent content in Hashcat on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sun, 01 Jun 2025 15:43:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/hashcat/index.xml" rel="self" type="application/rss+xml"/><item><title> WPA/WPA2 Protocol: Packet format analysis and attacks against it</title><link>https://chiefdennis.github.io/projects/wpa_protocol_attacks/</link><pubDate>Sun, 01 Jun 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/wpa_protocol_attacks/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/projects/wpa_protocol_attacks/image1.png" alt="">&lt;/p>
&lt;h2 id="identification-of-the-different-types-of-wpa-protocol-packets">
 Identification of the different types of WPA protocol packets.
 &lt;a class="heading-link" href="#identification-of-the-different-types-of-wpa-protocol-packets">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>In this first phase, the analysis of a traffic capture corresponding to a WiFi network with WPA2-PSK authentication has been carried out. The tool used has been Wireshark, due to its ability to interpret and decompose network protocols in a detailed way. The purpose of this point is to identify the different types of packets involved in the WPA2 connection and authentication process, as well as to examine the most relevant fields of each and understand their function within the overall context of the capture.&lt;/p></description></item><item><title>WifiChallenge Lab CTF</title><link>https://chiefdennis.github.io/projects/wifi_challenge_lab/</link><pubDate>Thu, 15 May 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/wifi_challenge_lab/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/projects/wifi_challenge_lab/image1.png" alt="">&lt;/p>
&lt;h2 id="introduction">
 Introduction
 &lt;a class="heading-link" href="#introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>This write-up summarizes the completion of the WiFiChallenge Lab, a practical cybersecurity exercise focused on wireless network security. Throughout the lab, various Wi-Fi attack techniques were explored and executed, including packet capture, handshake extraction, password cracking, and exploiting common vulnerabilities in WEP and WPA/WPA2 networks. The objective was to simulate real-world scenarios, enhance practical skills in wireless penetration testing, and deepen understanding of Wi-Fi security protocols and their weaknesses. This walkthrough outlines the methodology, tools used, challenges encountered, and key takeaways from the experience.&lt;/p></description></item><item><title>Bizness HTB Walkthrough</title><link>https://chiefdennis.github.io/posts/htb_bizness/</link><pubDate>Fri, 02 Feb 2024 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/htb_bizness/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/htb_bizness/15.png#center" alt="image">&lt;/p>
&lt;p>The Bizness HTB machine is an easy difficulty level HackTheBox Machine. The main techniques and tools used to crack this machine are:&lt;/p>
&lt;pre>&lt;code> - Dirsearch
 - CVE-2023-51467
 - Grep, find and strings
 - Hashcat
&lt;/code>&lt;/pre>
&lt;h2 id="reconnaissance">
 Reconnaissance
 &lt;a class="heading-link" href="#reconnaissance">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>We start a broad Nmap scan by executing the following command:&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" class="chroma">&lt;code class="language-sh" data-lang="sh">&lt;span class="line">&lt;span class="cl">sudo nmap -sS -T5 -vvv -p- 10.10.11.252 -Pn -oG nmap_inicial
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>Where the arguments mean:&lt;/p></description></item></channel></rss>