If the ESSID wasn't changed, the speed impact isn't so much.
Hashcat will not stop unless all PSKs are tested against all hashes.
To calculate the elapsed time, I used a small word list that doesn't contain matching PSKs.
And I use Linux "time" to calculate the elapsed time and not(!) hashcat's internal calculation of elapsed time.
Code:
$ hcxhashtool -i test.22000
OUI information file...........: /home/zerobeat/.hcxtools/oui.txt
OUI entires...................: 30555
total lines read..............: 887
valid hash lines..............: 887
PMKID hash lines..............: 258
EAPOL hash lines..............: 629
$ time hashcat -m 22000 test.22000 uncracked.txt.gz
hashcat (v6.2.4-76-g4b6654b50) starting
Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL)
Hash.Target......: test.22000
Time.Started.....: Sun Sep 26 23:02:42 2021 (5 secs)
Time.Estimated...: Sun Sep 26 23:02:47 2021 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (uncracked.txt.gz)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 76595 H/s (7.56ms) @ Accel:8 Loops:256 Thr:512 Vec:1
Recovered........: 0/887 (0.00%) Digests
Progress.........: 292559/292559 (100.00%)
Rejected.........: 0/292559 (0.00%)
Restore.Point....: 292559/292559 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:886-1773
Candidate.Engine.: Device Generator
Candidates.#1....: fedotov90 -> 87077890366
Hardware.Mon.#1..: Temp: 59c Fan: 44% Util: 0% Core:1885MHz Mem:5005MHz Bus:16
Started: Sun Sep 26 23:02:40 2021
Stopped: Sun Sep 26 23:02:48 2021
real 0m7,271s
user 0m1,904s
sys 0m1,225s
Less hashes:
Code:
$ hcxhashtool -i test20.22000
OUI information file...........: /home/zerobeat/.hcxtools/oui.txt
OUI entires...................: 30555
total lines read..............: 20
valid hash lines..............: 20
PMKID hash lines..............: 6
EAPOL hash lines..............: 14
$ time hashcat -m 22000 test20.22000 uncracked.txt.gz
hashcat (v6.2.4-76-g4b6654b50) starting
Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 22000 (WPA-PBKDF2-PMKID+EAPOL)
Hash.Target......: test20.22000
Time.Started.....: Sun Sep 26 23:05:00 2021 (2 secs)
Time.Estimated...: Sun Sep 26 23:05:02 2021 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Base.......: File (uncracked.txt.gz)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 193.3 kH/s (7.69ms) @ Accel:8 Loops:256 Thr:512 Vec:1
Recovered........: 0/20 (0.00%) Digests
Progress.........: 292559/292559 (100.00%)
Rejected.........: 0/292559 (0.00%)
Restore.Point....: 292559/292559 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:19-39
Candidate.Engine.: Device Generator
Candidates.#1....: fedotov90 -> 87077890366
Hardware.Mon.#1..: Temp: 58c Fan: 39% Util: 0% Core:1885MHz Mem:5005MHz Bus:16
Started: Sun Sep 26 23:04:58 2021
Stopped: Sun Sep 26 23:05:04 2021
real 0m5,291s
user 0m1,707s
sys 0m1,156s
If the PSK was changed, you will possible get the history of PSK changes, when running against all hashes, e.g:
PSK from M1M2ROGUE:
password1234
Maybe we can assume the PSK could be password + digits!
Old PSK from M2M3:
password2018
Newer PSK from M2M3:
password2019
Now we can assume the latest PSK could be
password2021
because you recovered a complete history.
BTW:
To get full advantage of hashcat's reuse of PBKDF2:
If you know the ESSID:
Code:
$ hcxhashtool -i hasharchive.22000 --essid=TARGET_ESSID -o test.22000
Or group all ESSIDs:
Code:
$ hcxhashtool -i hasharchive.22000 --essid-group