05-05-2017, 06:20 AM
You seem to be severely confused, so let's set a few things straight:
1. This is an open forum, where anyone and everyone are free to respond. This isn't a ticketing system, this thread isn't "assigned" to me. There is nothing for me to pass on. If literally anyone else in the world is inclined to post on this thread, they will. But your questions are so naive that literally no one else is willing to even help you out a little bit.
2. I'm not dancing around, I'm trying to get you to do some research. You seem to be severely confused about what a PMK is, and how it is cracked. I'm not sore about anything other than your lack of desire to learn on your own. If you think I remember who you are from some previous conversation, or that I'm upset about your purchasing decisions, you're sorely mistaken.
Now then. The size of the PMK is 256 bits. But this is wholly irrelevant. The PMK is derived directly from the PSK, and that's what we attack. Those methods that you think only work if you know the length of the password? Those are the methods we use to crack WPA. Yes, we support brute forcing the PSK: "-m 2500 -a 3 some.hccapx''. But you're probably much better off with wordlists and rules. Again, read the damn documentation.
1. This is an open forum, where anyone and everyone are free to respond. This isn't a ticketing system, this thread isn't "assigned" to me. There is nothing for me to pass on. If literally anyone else in the world is inclined to post on this thread, they will. But your questions are so naive that literally no one else is willing to even help you out a little bit.
2. I'm not dancing around, I'm trying to get you to do some research. You seem to be severely confused about what a PMK is, and how it is cracked. I'm not sore about anything other than your lack of desire to learn on your own. If you think I remember who you are from some previous conversation, or that I'm upset about your purchasing decisions, you're sorely mistaken.
Now then. The size of the PMK is 256 bits. But this is wholly irrelevant. The PMK is derived directly from the PSK, and that's what we attack. Those methods that you think only work if you know the length of the password? Those are the methods we use to crack WPA. Yes, we support brute forcing the PSK: "-m 2500 -a 3 some.hccapx''. But you're probably much better off with wordlists and rules. Again, read the damn documentation.