<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: William &#8211; WPA/WPA2 4-way handshake extraction script</title>
	<atom:link href="http://www.exploresecurity.com/william-wpawpa2-4-way-handshake-extraction-script/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.exploresecurity.com/william-wpawpa2-4-way-handshake-extraction-script/</link>
	<description>IT security tools, techniques and commentary</description>
	<lastBuildDate>Sun, 07 Sep 2025 03:12:25 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.6.1</generator>
	<item>
		<title>By: blake</title>
		<link>http://www.exploresecurity.com/william-wpawpa2-4-way-handshake-extraction-script/#comment-60252</link>
		<dc:creator>blake</dc:creator>
		<pubDate>Wed, 31 Jul 2019 17:20:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=14#comment-60252</guid>
		<description><![CDATA[god, thank you so much.  I don&#039;t know why, but validating that packets contain EAPOL data has been soooo painful.]]></description>
		<content:encoded><![CDATA[<p>god, thank you so much.  I don&#8217;t know why, but validating that packets contain EAPOL data has been soooo painful.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pentesting</title>
		<link>http://www.exploresecurity.com/william-wpawpa2-4-way-handshake-extraction-script/#comment-40375</link>
		<dc:creator>Pentesting</dc:creator>
		<pubDate>Fri, 14 Dec 2018 05:42:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=14#comment-40375</guid>
		<description><![CDATA[I understand. 
I would like to thank you so much for your time.]]></description>
		<content:encoded><![CDATA[<p>I understand.<br />
I would like to thank you so much for your time.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jerome</title>
		<link>http://www.exploresecurity.com/william-wpawpa2-4-way-handshake-extraction-script/#comment-40309</link>
		<dc:creator>Jerome</dc:creator>
		<pubDate>Wed, 12 Dec 2018 22:55:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=14#comment-40309</guid>
		<description><![CDATA[To be honest I&#039;ve not been keeping much of an eye on this space for some time but I don&#039;t believe so, no. I mean, even if you decrypted the packets somehow, you wouldn&#039;t see what the &lt;em&gt;public&lt;/em&gt; IP address of the router was. You&#039;d have to inject packets to talk to services that return such information, or log in to the router itself. Which as far as I know means knowing the passphrase!]]></description>
		<content:encoded><![CDATA[<p>To be honest I&#8217;ve not been keeping much of an eye on this space for some time but I don&#8217;t believe so, no. I mean, even if you decrypted the packets somehow, you wouldn&#8217;t see what the <em>public</em> IP address of the router was. You&#8217;d have to inject packets to talk to services that return such information, or log in to the router itself. Which as far as I know means knowing the passphrase!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pentesting</title>
		<link>http://www.exploresecurity.com/william-wpawpa2-4-way-handshake-extraction-script/#comment-40308</link>
		<dc:creator>Pentesting</dc:creator>
		<pubDate>Wed, 12 Dec 2018 22:13:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=14#comment-40308</guid>
		<description><![CDATA[Oh damn !
Do you any suggestion to sniff public address ip of a target router AP (encrypted with WPA) ?
There is a solution : &quot;wesside-ng&quot; but only if the targer AP is encrypted with WEP.
Thank you in advance]]></description>
		<content:encoded><![CDATA[<p>Oh damn !<br />
Do you any suggestion to sniff public address ip of a target router AP (encrypted with WPA) ?<br />
There is a solution : &#8220;wesside-ng&#8221; but only if the targer AP is encrypted with WEP.<br />
Thank you in advance</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jerome</title>
		<link>http://www.exploresecurity.com/william-wpawpa2-4-way-handshake-extraction-script/#comment-40307</link>
		<dc:creator>Jerome</dc:creator>
		<pubDate>Wed, 12 Dec 2018 22:09:20 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=14#comment-40307</guid>
		<description><![CDATA[No, the 4-way handshake won&#039;t leak this. Not that the 4-way handshake is always necessary these days! - see &lt;a href=&quot;https://securityaffairs.co/wordpress/78800/hacking/wifi-hack.html&quot; rel=&quot;nofollow&quot;&gt;this article&lt;/a&gt;]]></description>
		<content:encoded><![CDATA[<p>No, the 4-way handshake won&#8217;t leak this. Not that the 4-way handshake is always necessary these days! &#8211; see <a href="https://securityaffairs.co/wordpress/78800/hacking/wifi-hack.html" rel="nofollow">this article</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pentesting</title>
		<link>http://www.exploresecurity.com/william-wpawpa2-4-way-handshake-extraction-script/#comment-40278</link>
		<dc:creator>Pentesting</dc:creator>
		<pubDate>Tue, 11 Dec 2018 23:36:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=14#comment-40278</guid>
		<description><![CDATA[Hello,
Sorry if i&#039;m asking a question a little bit far of the subject of this post.
I would like to know if there is a solution to know the public ip address of a target Router AP (not connected to it) ?
If I capture a 4-way handshake, can I decrypt it to discover the public ip address ?
Thank you]]></description>
		<content:encoded><![CDATA[<p>Hello,<br />
Sorry if i&#8217;m asking a question a little bit far of the subject of this post.<br />
I would like to know if there is a solution to know the public ip address of a target Router AP (not connected to it) ?<br />
If I capture a 4-way handshake, can I decrypt it to discover the public ip address ?<br />
Thank you</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jerome</title>
		<link>http://www.exploresecurity.com/william-wpawpa2-4-way-handshake-extraction-script/#comment-21946</link>
		<dc:creator>Jerome</dc:creator>
		<pubDate>Fri, 20 Oct 2017 16:31:07 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=14#comment-21946</guid>
		<description><![CDATA[This is a bit too far in the past for further work I&#039;m afraid!]]></description>
		<content:encoded><![CDATA[<p>This is a bit too far in the past for further work I&#8217;m afraid!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: malik shab</title>
		<link>http://www.exploresecurity.com/william-wpawpa2-4-way-handshake-extraction-script/#comment-21937</link>
		<dc:creator>malik shab</dc:creator>
		<pubDate>Fri, 20 Oct 2017 04:17:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=14#comment-21937</guid>
		<description><![CDATA[alternative clean up script ?]]></description>
		<content:encoded><![CDATA[<p>alternative clean up script ?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jerome</title>
		<link>http://www.exploresecurity.com/william-wpawpa2-4-way-handshake-extraction-script/#comment-6033</link>
		<dc:creator>Jerome</dc:creator>
		<pubDate>Sat, 31 Oct 2015 20:59:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=14#comment-6033</guid>
		<description><![CDATA[Hi. Assuming you&#039;re running with the defaults, try running this in the same directory as your capture file:
tshark -r YOUR_FILE.cap -R &quot;eapol.keydes.key_info == 0x010a &#124;&#124; eapol.keydes.key_info == 0x0109&quot; -T fields -e eapol.keydes.mic -e wlan.bssid -e eapol.keydes.key_info -e wlan.sa
What output do you get?]]></description>
		<content:encoded><![CDATA[<p>Hi. Assuming you&#8217;re running with the defaults, try running this in the same directory as your capture file:<br />
tshark -r YOUR_FILE.cap -R &#8220;eapol.keydes.key_info == 0x010a || eapol.keydes.key_info == 0&#215;0109&#8243; -T fields -e eapol.keydes.mic -e wlan.bssid -e eapol.keydes.key_info -e wlan.sa<br />
What output do you get?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Dan Biles</title>
		<link>http://www.exploresecurity.com/william-wpawpa2-4-way-handshake-extraction-script/#comment-5972</link>
		<dc:creator>Dan Biles</dc:creator>
		<pubDate>Mon, 26 Oct 2015 18:30:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=14#comment-5972</guid>
		<description><![CDATA[Jerome,

thanks for william, but it&#039;s telling me a valid (works everywhere else) .cap file from Airodum-ng is not a valid capture file and doesn&#039;t (yes it does....that&#039;s all it contains!) contain any EAPOL packets.  I&#039;m running this in Kali 2.0 linux  in a VirtualBox on a Macbook pro.
thanks Dan Biles   dbiles@comcast.net]]></description>
		<content:encoded><![CDATA[<p>Jerome,</p>
<p>thanks for william, but it&#8217;s telling me a valid (works everywhere else) .cap file from Airodum-ng is not a valid capture file and doesn&#8217;t (yes it does&#8230;.that&#8217;s all it contains!) contain any EAPOL packets.  I&#8217;m running this in Kali 2.0 linux  in a VirtualBox on a Macbook pro.<br />
thanks Dan Biles   <a href="mailto:dbiles@comcast.net">dbiles@comcast.net</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
