01-30-2018, 06:27 PM
Nice to hear that it works.
BTW: It's not me alone (RealEnder, Atom, Magnum, Neheb, TOXIC, freeroute - they all belong to the team)
Some words about m -12000 in combination with WiFi:
If you have captured a PMK from an EAP authentication (hcxtools can do this) and you have
- an idea about the salt
- the password
- or retrieved a possible password from the EAP ID (hcxtools can do this)
- or from the username (hcxtools can do this)
- or from the wlan traffic (hcxtools can do this)
then it's time for hashcat -m 12000
BTW: It's not me alone (RealEnder, Atom, Magnum, Neheb, TOXIC, freeroute - they all belong to the team)
Some words about m -12000 in combination with WiFi:
If you have captured a PMK from an EAP authentication (hcxtools can do this) and you have
- an idea about the salt
- the password
- or retrieved a possible password from the EAP ID (hcxtools can do this)
- or from the username (hcxtools can do this)
- or from the wlan traffic (hcxtools can do this)
then it's time for hashcat -m 12000