length & Mask problem with PMK (-m 2501/16801)
#2
not possible. math must be understood and respected. things that are infeasible, are and will remain infeasible (at least for our lifetime).

as we told you already hundreds of times (at least that is how it feels, btw: I got also PMs from baba and I tried really hard to explain it in detail), PMK values are not meant to be brute forced, you do not brute-force a 32 byte (or 64 hex character) long PMK.

Please stop this nonsense. If you do not understand what PMK is and how to use it, you should either accept our help and inform yourself (and be willing to learn) and use this hash mode as it was meant to be used, or move on cracking WPA without PMK (-m 2500 for instance).
Reply


Messages In This Thread
RE: length & Mask - by philsmd - 05-05-2019, 05:03 PM
RE: length & Mask - by baba - 05-05-2019, 06:39 PM
RE: length & Mask - by philsmd - 05-06-2019, 09:03 AM
RE: length & Mask - by baba - 05-06-2019, 05:10 PM