11-04-2022, 07:26 AM
In addition to what @slyexe mentioned:
I guess you want to recover the 20 digit WPA2 Pre Shared Key of a FRITZBOX.
This is not SHA1:
$ hashcat --help | grep " 100 "
100 | SHA1
Instead it is WPA-PBKDF2-PMKID+EAPOL (which is a very slow algo):
$ hashcat --help | grep 22000
22000 | WPA-PBKDF2-PMKID+EAPOL
You have to capture an EAPOL MESSAGE PAIR, because FRITZBOXes do not use a PMKID and to convert it to a hc22000 hash line, hashcat can work on.
How to do this is explained here:
https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2
I guess you want to recover the 20 digit WPA2 Pre Shared Key of a FRITZBOX.
This is not SHA1:
$ hashcat --help | grep " 100 "
100 | SHA1
Instead it is WPA-PBKDF2-PMKID+EAPOL (which is a very slow algo):
$ hashcat --help | grep 22000
22000 | WPA-PBKDF2-PMKID+EAPOL
You have to capture an EAPOL MESSAGE PAIR, because FRITZBOXes do not use a PMKID and to convert it to a hc22000 hash line, hashcat can work on.
How to do this is explained here:
https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2