# hcxtools

## Install (Ubuntu 24.04)
```
git clone https://github.com/ZerBea/hcxtools.git ~/hcxtools
cd ~/hcxtools
sudo apt install libcurl4-openssl-dev libssl-dev zlib1g-dev -y
make -j $(nproc)
```

## Extract PMKIDS from the main capture file

```
hcxpcapngtool -o pmkid.txt -E wordlist output.pcapng
```

:::tip
I wasted so much time massaging this export because I didn't understand that in this context, `wordlist` means a wordlist will be *created* with any wifi names that are contained in the `output.pcapng`.
:::

## Extract traffic and convert to hash format
```
sudo hcxpcapngtool -o hash.hc22000 -E wordlist output.pcapng
```

#### Parse .hc22000 file
With your `hash.hc22000` file in hand, you can parse it for which networks got pwned:

```
sudo hcxhashtool -i hash.hc22000 --info=stdout
```

*More info about this [here](https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2)*

### Crack away!
Check our [hashcat](/pentesting/Internal/hashcat) page for more info on cracking these hashes.
