The length of a PSK is always 8 -> 63 (hash mode 22000) and hashcat will tell you that:
The length of a PMK is always 64 (hash mode 22001) and hashcat will tell you that:
The PMK is calculated via PBKDF2 function from ESSID and PSK:
PMK = PBKDF2(PSK, ESSID, 4096)
as described here:
https://en.wikipedia.org/wiki/Pbkdf2
Running hash mode 22001 the dictionary should contain only PMKs of length 64 (HEX).
The example is working as expected:
Code:
Minimum password length supported by kernel: 8
Maximum password length supported by kernel: 63
The length of a PMK is always 64 (hash mode 22001) and hashcat will tell you that:
Code:
Minimum password length supported by kernel: 64
Maximum password length supported by kernel: 64
The PMK is calculated via PBKDF2 function from ESSID and PSK:
PMK = PBKDF2(PSK, ESSID, 4096)
as described here:
https://en.wikipedia.org/wiki/Pbkdf2
Running hash mode 22001 the dictionary should contain only PMKs of length 64 (HEX).
The example is working as expected:
Code:
$ echo "WPA*01*5ce7ebe97a1bbfeb2822ae627b726d5b*27462da350ac*accd10fb464e*686173686361742d6573736964***" > test.hc22000
$ echo "88f43854ae7b1624fc2ab7724859e795130f4843c7535729e819cf92f39535dc" > pmk.dict
$ hashcat -m 22001 test.hc22000 pmk.dict
hashcat (v6.2.4-95-g707bff5c2) starting
CUDA API (CUDA 11.4)
====================
* Device #1: NVIDIA GeForce GTX 1650, 3857/3911 MB, 16MCU
OpenCL API (OpenCL 3.0 CUDA 11.4.136) - Platform #1 [NVIDIA Corporation]
========================================================================
* Device #2: NVIDIA GeForce GTX 1650, skipped
Minimum password length supported by kernel: 64
Maximum password length supported by kernel: 64
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Optimizers applied:
* Zero-Byte
* Single-Hash
* Single-Salt
* Slow-Hash-SIMD-LOOP
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 1198 MB
Dictionary cache built:
* Filename..: pmk.dict
* Passwords.: 1
* Bytes.....: 65
* Keyspace..: 1
* Runtime...: 0 secs
The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supply more work, your cracking speed will drop.
For tips on supplying more work, see: https://hashcat.net/faq/morework
Approaching final keyspace - workload adjusted.
5ce7ebe97a1bbfeb2822ae627b726d5b:27462da350ac:accd10fb464e:hashcat-essid:88f43854ae7b1624fc2ab7724859e795130f4843c7535729e819cf92f39535dc
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 22001 (WPA-PMK-PMKID+EAPOL)
Hash.Target......: test.hc22000
Time.Started.....: Fri Oct 22 13:03:32 2021 (0 secs)
Time.Estimated...: Fri Oct 22 13:03:32 2021 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (pmk.dict)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 5508 H/s (0.00ms) @ Accel:1024 Loops:1024 Thr:256 Vec:1
Recovered........: 1/1 (100.00%) Digests
Progress.........: 1/1 (100.00%)
Rejected.........: 0/1 (0.00%)
Restore.Point....: 0/1 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: 88f43854ae7b1624fc2ab7724859e795130f4843c7535729e819cf92f39535dc -> 88f43854ae7b1624fc2ab7724859e795130f4843c7535729e819cf92f39535dc
Hardware.Mon.#1..: Temp: 47c Util: 32% Core:1965MHz Mem:4001MHz Bus:8
Started: Fri Oct 22 13:03:31 2021
Stopped: Fri Oct 22 13:03:33 2021