hcxpcaptool - output possible WPA/WPA2 plainmasterkey list - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: General Talk (https://hashcat.net/forum/forum-33.html) +--- Thread: hcxpcaptool - output possible WPA/WPA2 plainmasterkey list (/thread-7721.html) |
hcxpcaptool - output possible WPA/WPA2 plainmasterkey list - Mem5 - 08-06-2018 Hi, I'm quite old to hash cracking but quite new to WPA stuff, and I take the new Zerbea tools release opportunity to learn and share. I don't know if hashcat forum it the best place to discuss about these tools ? Maybe it could feed the hcxtools github wiki as well ? Anyway, here is my question: Code: hcxpcaptool -h -> What can I do with this output file containing PMKs? Assumption: I saw the tool wlanpmk2hcx will "convert plainmasterkey and ESSID for use with hashcat hash-mode 12000" I notice 12000 is faster than 2500. Does it mean I can crack the password of my cap file using mode 12000 (which is faster) with the given PMK and ESSID ? Thanks. RE: hcxpcaptool - output possible WPA/WPA2 plainmasterkey list - ZerBea - 08-07-2018 If you have a PMK and an ESSID, you can try to retrieve the PSK using hashmode 12000. Read more here: https://hashcat.net/forum/thread-6661-post-35843.html#pid35843 |