Cracking a password present in wordlist doesn't work
#6
Alright i've read the doc you sent me and have a few noobish questions:

This is how to understand MESSAGEPAIR ok.

Code:
bitmask of message pair field PMKID (WPA*01):
0: reserved
1: PMKID taken from AP
2: reserved
4: PMKID taken from CLIENT (wlan.da: possible MESH or REPEATER)
5: reserved
6: reserved
7: reserved


bitmask of message pair field EAPOL (WPA*02):
2,1,0:
000 = M1+M2, EAPOL from M2 (challenge)
001 = M1+M4, EAPOL from M4 (authorized) - usable if NONCE_CLIENT is not zeroed
010 = M2+M3, EAPOL from M2 (authorized)
011 = M2+M3, EAPOL from M3 (authorized) - unused
100 = M3+M4, EAPOL from M3 (authorized) - unused
101 = M3+M4, EAPOL from M4 (authorized) - usable if NONCE_CLIENT is not zeroed
3: reserved
4: ap-less attack (set to 1) - nonce-error-corrections not required
5: LE router detected (set to 1) - nonce-error-corrections required only on LE
6: BE router detected (set to 1) - nonce-error-corrections required only on BE
7: not replaycount checked (set to 1) - replaycount not checked, nonce-error-corrections mandatory

Let try with an example. if I follow what's written in the doc:

Code:
WPA*01*PMKID*MAC_AP*MAC_CLIENT*ESSID***MESSAGEPAIR

This is the formatting of my hash.hc22000 which is correct. In my case tho, I have the line but the MESSAGEPAIR is missing.
So why is it missing ? Does it comes from my configuration of the tools when i launch the command of is it related to the AP or just my adapter have not intercept the MESSAGEPAIR ?

Sorry if this sound obvious for you, just learning and try to understand and not just executing command blindly.
Reply


Messages In This Thread
RE: Cracking a password present in wordlist doesn't work - by bbjjlk - 07-24-2023, 02:05 PM