Tactic for cracking WPA password
#10
Majro advantage is that you get on every entry of the wpa-supplicant.conf an EAPOL M2 from the CLIENT. That may include false tries (e.g.: pasword1 instead of password1) or an entire PSK change history (in both cases high value of ----attemptclientmax is mandatory).
If the ESSID (salt) doesn't change, you can get advantage of hashcat's reuse of PBKDF2.

In other words:
PMK, M2M3 or M3M4, or M1M4 is useful if your goal is to break a single NETWORK
hcxdumptool is able to run this old school attacks, but it isn't the goal.

M1M2 is useful to break an entire system (history, pattern, iterations).
This is the goal.
Reply


Messages In This Thread
RE: Tactic for cracking WPA password - by marc1n - 06-02-2023, 09:55 PM
RE: Tactic for cracking WPA password - by powermi - 06-03-2023, 07:02 AM
RE: Tactic for cracking WPA password - by ZerBea - 06-03-2023, 07:59 AM
RE: Tactic for cracking WPA password - by se7enge - 06-10-2023, 11:55 PM
RE: Tactic for cracking WPA password - by ZerBea - 06-11-2023, 07:40 PM
RE: Tactic for cracking WPA password - by se7enge - 06-12-2023, 12:42 AM
RE: Tactic for cracking WPA password - by ZerBea - 06-12-2023, 08:32 AM
RE: Tactic for cracking WPA password - by se7enge - 06-13-2023, 02:41 PM
RE: Tactic for cracking WPA password - by ZerBea - 06-13-2023, 10:41 PM