Multiple hashes for the same user (WPA, PMKID, NetNTLMv2)
#1
Hello!

I'm running into another issue/question about what I need to crack.

I have collected several WPA handshakes, PMKIDs and NetNTLMv2 challenge/response pairs.

Many of these are duplicates for the same user and/or SSID

For example, I have 9 unique PMKID for a single SSID.

If cracked, those 9 PMKID should all result in the same password. (And I've tested this on a simple password to confirm)

The more PMKIDs I sent to hashcat, the slower it goes. Is there any reason I'd WANT to send every unique, but duplicate, PMKID I collect to hashcat?
#2
Especially with WPA there is a chance of transmission errors. For other hash types less so.
#3
(12-07-2018, 05:37 PM)undeath Wrote: Especially with WPA there is a chance of transmission errors. For other hash types less so.

Thank you!