07-28-2019, 02:18 AM
(This post was last modified: 07-28-2019, 03:20 AM by bob_abounds.
Edit Reason: clarity
)
So I captured 22 PMKIDs, exported with hcxtpcapool, cracked one of the PMKIDs but the result shows what looks like a hash string and then the plaintext password.
Results below:
"9d155eb5bfe7f2371840c702e21f7a6e7af2d60d5c2c0b4fbace2ed71cf62fa9:amazinf"
How do i find the AP it belongs to?
Results below:
"9d155eb5bfe7f2371840c702e21f7a6e7af2d60d5c2c0b4fbace2ed71cf62fa9:amazinf"
How do i find the AP it belongs to?