Looks like a PMKID or a MIC. Both of them are not(!) md5.
The PMKID attack is explained here:
https://hashcat.net/forum/thread-7717.html
and the 4way handshake here (inclusive a tutorial to calculate all values via bash):
https://praneethwifi.in/2019/11/09/4-way...ification/
It is mandatory to convert the dump file to a hash format (Network Protocol) accepted by hashcat as explained here:
https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2
An online converter is here:
https://hashcat.net/cap2hashcat/
After conversion run hashcat e.g with a partial mask:
Some additional information is here:
https://hashcat.net/forum/thread-10553-p...l#pid54456
The PMKID attack is explained here:
https://hashcat.net/forum/thread-7717.html
and the 4way handshake here (inclusive a tutorial to calculate all values via bash):
https://praneethwifi.in/2019/11/09/4-way...ification/
It is mandatory to convert the dump file to a hash format (Network Protocol) accepted by hashcat as explained here:
https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2
An online converter is here:
https://hashcat.net/cap2hashcat/
After conversion run hashcat e.g with a partial mask:
Code:
$ hashcat -m 22000 converted_hash_file.hc22000 -a 3 8348?d?d?d?d
Some additional information is here:
https://hashcat.net/forum/thread-10553-p...l#pid54456