Understanding EAPOL 4-Way Handshake and PMKID cracking
#4
Kiwil3mon, let me use your post for asking about something that I dont know of how Hashcat works with PMKIDs or HandShakes.
when I place on a file a PMKID or HS that I want to break using a mask of 10 digits, Hashcat shows a remaining time of 7 hours, If a place another handshake of PMKID from the same AP, Hashcat keep showing the same time for both of them.
So my question.. Does Hashcat read the BSSIDs and ESSIDs of avoiding double, triple, etc work?


Session..........: hashcat
Status...........: Running
Hash.Name........: WPA-PBKDF2-PMKID+EAPOL
Hash.Target......: /home/powermi/WPA/hashes/ONOE25.22000
Time.Started.....: Wed Apr 1 16:48:24 2020 (1 sec)
Time.Estimated...: Wed Apr 1 23:18:57 2020 (6 hours, 30 mins)
Guess.Mask.......: ?d?d?d?d?d?d?d?d?d?d [10]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 426.8 kH/s (70.92ms) @ Accel:64 Loops:64 Thr:1024 Vec:1
Recovered........: 0/10 (0.00%) Digests
Progress.........: 0/10000000000 (0.00%)
Rejected.........: 0/0 (0.00%)
Restore.Point....: 0/1000000000 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:1216-1280
Candidates.#1....: 1234567899 -> 1791464345
Hardware.Mon.#1..: Temp: 52c Fan: 30% Util:100% Core:1950MHz Mem:6801MHz Bus:16
Reply


Messages In This Thread
RE: Understanding EAPOL 4-Way Handshake and PMKID cracking - by powermi - 04-01-2020, 04:54 PM