Hashcat + wlangenpmkocl how to convert back to plaintext ?
#2
Hash mode 2501, 16801 and 22001 are designed to verify an existing Plain Master Key PMK. That can be a PMK from a rainbow table, e.g. calculated by wlangenpmkocl.
Workflow:
calculate PMK list
$ wlangenpmkocl -e network-essid -i passwordlist -A combi.list
The combi.list contain PMK and PSK

Now get the PMKs and feed hascat with them:
$ cut -c -64 > pmk.list

run ahshcat to find the PMK
$ hashcat -m 2501 hash.hccapx pmk.list

if the PMK is verified by hashcat, grep for it in the combi.list
$ cat combi.list | grep e02ede2909ac91cd095ce1fc469f6990a6d
and you will see the matching PSK.

BTW1:
Due to the length of the PMK it is impossible to run a mask or a rule to find a new one.

BTW2:
Hash mode 250x and 1680x are deprecated. You should use hash mode 2200x instead.
Reply


Messages In This Thread
RE: Hashcat + wlangenpmkocl how to convert back to plaintext ? - by ZerBea - 02-21-2021, 02:08 AM