Hash mode 22000 take a PSK as input, while hash mode 22001 take a PMK as input.
Running hash mode 22001, all your PSKs, stored in your dictionary are rejected and hashcat (both versions) told you that:
Try the 22001 example hash from here:
https://hashcat.net/wiki/doku.php?id=example_hashes
get the PMK as mentioned in footnote 18:
run hashcat
Try it, running latest git head of hashcat:
https://github.com/hashcat/hashcat
If you still get an error, I recommend to open an issue report here:
https://github.com/hashcat/hashcat/issues
Please notice that hash mode 22001 is designed for analysis purpose only, to verify an existing PMK (already calculated by PBKDF2 function):
To calculate a PMK by PBKDF2 function it is mandatory to know PSK and ESSID.
From hashcat --help:
Running hash mode 22001, all your PSKs, stored in your dictionary are rejected and hashcat (both versions) told you that:
Code:
Rejected.........: 99/99 (100.00%)
Try the 22001 example hash from here:
https://hashcat.net/wiki/doku.php?id=example_hashes
Code:
echo "WPA*01*5ce7ebe97a1bbfeb2822ae627b726d5b*27462da350ac*accd10fb464e*686173686361742d6573736964***" > test.hc22000
get the PMK as mentioned in footnote 18:
Code:
echo "88f43854ae7b1624fc2ab7724859e795130f4843c7535729e819cf92f39535dc" > pmk.dict
run hashcat
Code:
$ hashcat -m 22001 test.hc22000 pmk.dict
Try it, running latest git head of hashcat:
https://github.com/hashcat/hashcat
If you still get an error, I recommend to open an issue report here:
https://github.com/hashcat/hashcat/issues
Please notice that hash mode 22001 is designed for analysis purpose only, to verify an existing PMK (already calculated by PBKDF2 function):
Code:
$ wlangenpmk -p "hashcat!" -e "hashcat-essid"
essid (networkname)....: hashcat-essid
password...............: hashcat!
plainmasterkey (SHA1)..: 88f43854ae7b1624fc2ab7724859e795130f4843c7535729e819cf92f39535dc
From hashcat --help:
Code:
22000 | WPA-PBKDF2-PMKID+EAPOL | Network Protocol
22001 | WPA-PMK-PMKID+EAPOL | Network Protocol