22000 - PMKID and EAPOL for same network - two different keys recovered ? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: 22000 - PMKID and EAPOL for same network - two different keys recovered ? (/thread-10396.html) |
22000 - PMKID and EAPOL for same network - two different keys recovered ? - vom - 10-11-2021 Hello, I have some 22000 hashes for a single network (same SSID, same BSSID). I have both WPA*01 + WPA*02. Each is from a different client though. Hashcat has cracked both of them, but with different passwords. This is a consumer grade AP. I'm a bit confused as to how/why I'm getting two different passwords. Do consumer grade AP's support multiple PSK per SSID nowadays ? This doesn't seem likely to me... Or is something else going on that I'm not understanding ? Thanks in advance. RE: 22000 - PMKID and EAPOL for same network - two different keys recovered ? - ZerBea - 10-11-2021 The last field of an EAPOL MESSAGEPAIR hash line (WPA*02) will give you an information about the status of the AUTHENTICATION as described here: https://hashcat.net/forum/thread-10253-post-53255.html#pid53255 https://hashcat.net/forum/thread-10253-post-53634.html#pid53634 I recommend to read the whole thread. The EAPOL MESSAGEPAIR could be recorded/requested from a CLIENT that doesn't belong to the target NETWORK. The PMKID (WPA*01) is transmitted by the ACCESS POINT. The PSK, calculated from this hash line should be the one that belong to the target NETWORK. Example from here: https://github.com/hashcat/hashcat/files/6913110/Hashcat_wireless1.zip as mentioned here: https://hashcat.net/forum/thread-10253-post-53255.html#pid53255 Code: $ hcxpcapngtool -o test.22000 corp_question1-01.cap I use hcxhashtool do analyze the hash file, rather than adding Wireshark screen shots: Code: $ hcxhashtool -i test.22000 --info=stdout The first CLIENT belong to the target NETWORK, the second one not. hcxpcapngtool convert challenges, too, because it is a good way to detect which kind of PSKs a not authorized CLIENT tried to get access to a target NETWORK. Please notice: Due to reuse of PBKDF2, you got two PSKs for the price of one (PBKDF2 calculation using the same SALT). How to filter challenges out (if you don't need them) is also described in the thread mentioned above. RE: 22000 - PMKID and EAPOL for same network - two different keys recovered ? - vom - 10-11-2021 Wow - great work as always and excellent explanation. Thanks much. RE: 22000 - PMKID and EAPOL for same network - two different keys recovered ? - ZerBea - 10-12-2021 That is only one of the advantages of hc22000 format. The last field of an EAPOL hash line (WPA*02) give you a detailed information about the kind of the converted MESSAGEPAIR. Explanation of the MESSAGEPAIR field and examples are added to hashcat wiki "Cracking WPA/WPA2 with hashcat": https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2#working_with_hash_files |