hashcat Forum
length & Mask problem with PMK (-m 2501/16801) - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Misc (https://hashcat.net/forum/forum-15.html)
+--- Forum: General Talk (https://hashcat.net/forum/forum-33.html)
+--- Thread: length & Mask problem with PMK (-m 2501/16801) (/thread-8344.html)



length & Mask problem with PMK (-m 2501/16801) - baba - 05-05-2019

1) can i know hashcat  support 64 length mask  ????
    need to use any special option??? 

2) can i know why stdin mode slow 
    mp64.exe -1 abcdef0123456789 ?1?1?1?.......... 

    how to do speed mp attack

    please


RE: length & Mask - philsmd - 05-05-2019

not possible. math must be understood and respected. things that are infeasible, are and will remain infeasible (at least for our lifetime).

as we told you already hundreds of times (at least that is how it feels, btw: I got also PMs from baba and I tried really hard to explain it in detail), PMK values are not meant to be brute forced, you do not brute-force a 32 byte (or 64 hex character) long PMK.

Please stop this nonsense. If you do not understand what PMK is and how to use it, you should either accept our help and inform yourself (and be willing to learn) and use this hash mode as it was meant to be used, or move on cracking WPA without PMK (-m 2500 for instance).


RE: length & Mask - baba - 05-05-2019

(05-05-2019, 05:03 PM)philsmd Wrote: not possible. math must be understood and respected. things that are infeasible, are and will remain infeasible (at least for our lifetime).

as we told you already hundreds of times (at least that is how it feels, btw: I got also PMs from baba and I tried really hard to explain it in detail), PMK values are not meant to be brute forced, you do not brute-force a 32 byte (or 64 hex character) long PMK.

Please stop this nonsense. If you do not understand what PMK is and how to use it, you should either accept our help and inform yourself (and be willing to learn) and use this hash mode as it was meant to be used, or move on cracking WPA without PMK (-m 2500 for instance).



really very sorry.

i dint understand .

Last Quotation. can i know please

PMK attack only support  Dictionary???   -m 16801 or 2501 Dictionary how is possible its to large 64 length pass   like 1000TB how to keep HDD???
the length ( min 64 max 64 ) so how to do ???
that is i try brute forced .. have any defriend way??? 

please


RE: length & Mask - philsmd - 05-06-2019

yeah, -a 0 (dictionary attack) makes most sense with -m 2501 and -m 16801

the general approach is to use wlangenpmk (or wlangenpmkocl for OpenCL support) from https://github.com/ZerBea/hcxkeys

Again, -m 2501 and -m 16801 make only sense in some particular situations (pre-computing like rainbowtables and having a small set of essid and reusing the pre-computed keys, PMKs). You need to use the tools that you got wisely and how they are supposed to be used. brute-forcing a 32 bytes (or 64 hexadecimal character) long PMK is not how this attack works !

There could be situations where you use other attack types besides -a 0 for PMKs, but I would say they are very, very rare, e.g. if you know the PMKs are somehow generated very badly (non-random) by the system etc.... but this is not the usual case. use hcxtools (yeah, sometimes it's possible to extract some info also with that tool from the capture) or hcxkeys (wlangenpmkocl, wlangenpmk) together with the PMK modes that hashcat supports.


RE: length & Mask - baba - 05-06-2019

(05-06-2019, 09:03 AM)philsmd Wrote: yeah, -a 0 (dictionary attack) makes most sense with -m 2501 and -m 16801

the general approach is to use wlangenpmk (or wlangenpmkocl for OpenCL support) from https://github.com/ZerBea/hcxkeys

Again, -m 2501 and -m 16801 make only sense in some particular situations (pre-computing like rainbowtables and having a small set of essid and reusing the pre-computed keys, PMKs). You need to use the tools that you got wisely and how they are supposed to be used. brute-forcing a 32 bytes (or 64 hexadecimal character) long PMK is not how this attack works !

There could be situations where you use other attack types besides -a 0 for PMKs, but I would say they are very, very rare, e.g. if you know the PMKs are somehow generated very badly (non-random) by the system etc.... but this is not the usual case. use hcxtools (yeah, sometimes it's possible to extract some info also with that tool from the capture) or hcxkeys (wlangenpmkocl, wlangenpmk) together with the PMK modes that hashcat supports.


now i want o learn hcxkeys
lots of thankssssssssssssssssssssss for Explain to me