This is quick few notes on using and connecting the Pwnagotchi to Windows and having it collecting wireless handshake authentication traffic for cracking with HashCat.
Follow this video to setup and collect handshakes: NetworkChuck Raspberry Pi Zero PwnAgothci Project
The original instructions for the project: Pwnagotchi Project powered by bettercap
After raspberry pi zero been running in evironment capturing wireless handshakes the location of PCAP files stored All the handshakes Pwnagotchi captures are saved to
/root/handshakes/
.
- Connect with data usb cable to the usb port on Pi zero to Windows Desktop USB port.
- Device Manager select COM PORT and update RNDIS drivers from Windows 10 RNDIS drivers
- Set IP address under networking RNDIS TCP/IP 4 to
10.0.0.1
as the Raspberry pi is set to10.0.0.1
. - Use browser and connect
http://10.0.0.2:8080
with user name ofadmin:admin
- From windows command line connect as ssh to raspberry pi
ssh [email protected]
with default password asraspberry
In the ssh session on the raspberry pi, transfer the files:
ssh [email protected]
sudo su
cd /root/handshakes
cp /root/handshakes/ /home/pi/handshakes/ -R
chmod 777 /home/pi/handshakes
exit
Transfer PCAP to Kali for converting to HASHCAT format 22000:
sudo apt-get install hcxtools
hcxpcapngtool *.pcap -o candidates.hc22000 -E essid.wordlist
Transfer to hashcat host:
hashcat.exe -m 22000 s:\hashes\candidates.hc22000 s:\wordlists\essid.wordlist
Wireless WPA passwords cracking.