<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hcxpcapngtool on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/hcxpcapngtool/</link><description>Recent content in Hcxpcapngtool on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sun, 01 Jun 2025 15:43:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/hcxpcapngtool/index.xml" rel="self" type="application/rss+xml"/><item><title> WPA/WPA2 Protocol: Packet format analysis and attacks against it</title><link>https://chiefdennis.github.io/projects/wpa_protocol_attacks/</link><pubDate>Sun, 01 Jun 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/wpa_protocol_attacks/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/projects/wpa_protocol_attacks/image1.png" alt="">&lt;/p>
&lt;h2 id="identification-of-the-different-types-of-wpa-protocol-packets">
 Identification of the different types of WPA protocol packets.
 &lt;a class="heading-link" href="#identification-of-the-different-types-of-wpa-protocol-packets">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>In this first phase, the analysis of a traffic capture corresponding to a WiFi network with WPA2-PSK authentication has been carried out. The tool used has been Wireshark, due to its ability to interpret and decompose network protocols in a detailed way. The purpose of this point is to identify the different types of packets involved in the WPA2 connection and authentication process, as well as to examine the most relevant fields of each and understand their function within the overall context of the capture.&lt;/p></description></item><item><title>WifiChallenge Lab CTF</title><link>https://chiefdennis.github.io/projects/wifi_challenge_lab/</link><pubDate>Thu, 15 May 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/wifi_challenge_lab/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/projects/wifi_challenge_lab/image1.png" alt="">&lt;/p>
&lt;h2 id="introduction">
 Introduction
 &lt;a class="heading-link" href="#introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>This write-up summarizes the completion of the WiFiChallenge Lab, a practical cybersecurity exercise focused on wireless network security. Throughout the lab, various Wi-Fi attack techniques were explored and executed, including packet capture, handshake extraction, password cracking, and exploiting common vulnerabilities in WEP and WPA/WPA2 networks. The objective was to simulate real-world scenarios, enhance practical skills in wireless penetration testing, and deepen understanding of Wi-Fi security protocols and their weaknesses. This walkthrough outlines the methodology, tools used, challenges encountered, and key takeaways from the experience.&lt;/p></description></item></channel></rss>