Understanding EAPOL 4-Way Handshake and PMKID cracking
#2
1.
faster
you don't need a CLIENT
works if MFP is activated
not susceptible for packet loss

2.
No. hascat is working on the captured hash and the result is the PMK and the PSK.
Yes. Searching the PSK by trying to connect the AP with all combinations can take more than a human life time.

3.
Yes, you can recover PMK/PSK from a 4-way handshake. Make sure you have no packet loss.

4.
You can retrieve a PMK/PSK also from a CLIENT (AP-LESS) attack.

That are only short answers. Please read more here:
https://hashcat.net/forum/thread-7717.html
and here:
https://hashcat.net/forum/thread-6661.html
Reply


Messages In This Thread
RE: Understanding EAPOL 4-Way Handshake and PMKID cracking - by ZerBea - 03-31-2020, 09:00 AM