def hand_mode_ext(self, _tgt, _ph): pull.up("Verifying... Looking for %s[4 EAPOLs]%s" % (pull.BLUE, pull.END)) _eap = eAPoL(_tgt['bssid']) _pkts = rdpcap(_HANDSHAKE); _valid = False for pkt in _pkts: _yorn = _eap.check(pkt) if _yorn: _valid = True; break if _valid: _ph.THEPOL = _eap.get_pols() _ph.crack_shoot(_tgt, True) else: self.pull.error("Handshake not Found. Please provide a valid handshake!")
def h_crack(self, ap, p_to_h): if V__: pull.up('Reading Packets from Captured File: %s'\ % p_to_h) pkts = rdpcap(p_to_h) gen = eAPoL(ap['bssid']) for pkt in pkts: comp__ = gen.check(pkt) if comp__: if V__: pull.info('Valid Handshake Found. Manipulaing Data ...') pull.right('AP Manufacturer: %s' % (org(ap['bssid']).org)) break pols = gen.get_pols() self.call_PSK(pols, ap['essid'], ap['auth'])