How to get the PMKID attack program/tools functioning in Kali 2020

This will cover only the installation into Kali 2020 and how Musket Teams did it to several hard drive i386 installs.

This installation process was done to root, hence all downloads and operations were to root.

All our computers are set up with:

root@kali:~#dpkg-reconfigure kali-grant-root

and selected

Enable password=less privilege escalation

sudo su

then puts you directly in

root@kali:/home/kali#

enter cd and you are in root

root@kali:~#

To move files with file manager MTeams opened a terminal window in root and entered thunar ie:

root@kali:~#thunar

This opened the filemanager under root and allows unrestricted file movement with this program.

To install the tools for PMKID, get a internet connection and download the hxcdumptool, the hcxtools and the dependencies. If you do not load the dependencies the tools cannot be installed.

git clone https://github.com/ZerBea/hcxdumptool.git

git clone https://github.com/ZerBea/hcxtools.git

apt-get install libcurl4-openssl-dev libssl-dev zlib1g-dev libpcap-dev

Installation folders hcxdumptool and hcxtools were downloaded to root so when in root:

cd hcxdumptool

make

make install

cd hcxtools

make

make install

Install completed

MTeams are working with these programs. Any administrative scripts based on these tools that Mteams develops for our own use will be published.

MTeams