-
-
Notifications
You must be signed in to change notification settings - Fork 668
EAPOL PMKID Scan
The ESP32 is able to filter captured WiFi traffic to display and harvest EAPOL PMKID packets on a graphical user interface. PMKID packets are saved to an attached SD card in PCAP files long with the necessary WiFi traffic in order for the user to carry out PMKID cracking on a 3rd party device.
Once a packet is captured, it undergoes a series of check to ensure the desired information is present.
if (len == 173) {
Serial.println("Maybe the PMKID");
//sd_obj.addPacket(snifferPacket->payload, len);
}
if (( (snifferPacket->payload[30] == 0x88 && snifferPacket->payload[31] == 0x8e)|| ( snifferPacket->payload[32] == 0x88 && snifferPacket->payload[33] == 0x8e) )){
Serial.println("EAPOL!!");
//sd_obj.addPacket(snifferPacket->payload, len);
num_eapol++;
}
The number of captured EAPOL/PMKID packets is displayed on a landscape oriented line graph. The number of packets itself is represented by a blue line.
Once the line graph reaches the end of the screen, the graph begins refreshing and overwriting starting at the beginning of the graph.
The X and Y axis both feature +
and -
buttons which adjust the zoom level of the line data displayed on the graph.
The current sniffing channel can be adjusted by hitting the +
or -
buttons associated with the channel configuration at the top of the screen.
This function can be exited by hitting the red X button at the top of the screen.
- Home
- About
- FAQ
- Marauder Versions
- Troubleshooting
-
Getting Started
- Arduino IDE Setup
- DIY Platforms
- Installing Firmware
- Update Firmware
- Hardware
- Status Bar
- Commandline
- Marauder Settings
- Applications
- Thanks
- Countdown Page
- How to make biscuits and sausage gravy